Analysis of frame attack on Hsu et al.’s non-repudiable threshold multi-proxy multi-signature scheme with shared verification
Author(s) -
Samaneh Mashhadi
Publication year - 2012
Publication title -
scientia iranica
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.299
H-Index - 51
eISSN - 2345-3605
pISSN - 1026-3098
DOI - 10.1016/j.scient.2011.09.019
Subject(s) - proxy (statistics) , computer science , computer security , signature (topology) , adversary , frame (networking) , algorithm , mathematics , computer network , geometry , machine learning
Tzeng et al. proposed a threshold multi-proxy multi-signature scheme with threshold verification. Recently, Hsu et al. pointed out that Tzeng et al.’s scheme was vulnerable to insider attacks and proposed an improvement to eliminate the pointed out security leak. We will show that Hsu et al.’s improvement cannot resist the frame attack. That is, after intercepting a valid proxy signature, an adversary can change the original signers to himself, and forge a proxy signature. To remedy this weakness, we will propose a new method
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom