Abstract

A ( t, n) threshold proxy signature scheme allows any t or more proxy signers to cooperatively sign messages on behalf of an original signer, but t−1 or fewer proxy signers cannot. Sun et al. proposed a new ( t, n) threshold proxy signature scheme based on Zhang's threshold proxy signature scheme. Recently, Hsu et al. pointed out that Sun's scheme suffered from a drawback and proposed an improvement to counter it. However, the author of this paper shows that both Sun's scheme and Hsu's improvement are not secure against coalition attack. Some t or more malicious proxy signers can conspire together against the original signer. Finally, we propose a new improvement to counter this attack, the proxy generation and the signature computation of which is more efficient than those of Sun's scheme and Hsu's improvement. The main advantage of the new improvement is traceability, by which the original signer can identify the actual signers that are anonymous to outsiders.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.