首页|SECURITY ANALYSIS AND IMPROVEMENT OF A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME

SECURITY ANALYSIS AND IMPROVEMENT OF A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME

扫码查看
Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. However, in this paper, two forgery attacks are proposed to show that their schemes have serious security flaws. To overcome theses flaws, an improvement on Kang, et al.'sscheme is proposed.

Proxy signatureThreshold proxy signatureMulti-proxy multi-signatureForgery attack

Lu Rongbo、He Dake、Wang Changji

展开 >

College of Mathematics and Computer Science, Jishou University, Jishou 416000, China

Laboratory of Information Security and National Computing Gird, Southwest Jiaotong University, Chengdu 610031, China

Department of Computer Science, Sun Yat-Sen University, Guangzhou 510275, China

国家自然科学基金湖南省自然科学基金

6050300507JJ6110

2008

电子科学学刊(英文版)
中国科学院电子学研究所

电子科学学刊(英文版)

影响因子:0.138
ISSN:0217-9822
年,卷(期):2008.25(3)
  • 2
  • 1