Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013 (2013), Article ID 790257, 24 pages
http://dx.doi.org/10.1155/2013/790257
Research Article

Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers

Department of Computer Science and Engineering, Dr. B. R. Ambedkar National Institute of Technology, Jalandhar, Punjab, India

Received 24 July 2012; Accepted 16 November 2012

Academic Editor: Hung Nguyen-Xuan

Copyright © 2013 Raman Kumar et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. L. Rivest, A. Shamir, and L. M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the Association for Computing Machinery, vol. 21, no. 2, pp. 120–126, 1978. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  2. T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469–472, 1985. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  3. Y. Desmedt and Y. Frankel, “Threshold cryptosystems,” in Proceedings of the Advances in Cryptology (Crypto'89), pp. 307–315, 1989.
  4. K. Zhang, “Threshold Proxy Signature Schemes,” in Proceedings of the Information Security Workshop, pp. 191–197, 1997.
  5. S. Kim, S. Park, and D. Won, “Proxy signatures, revisited,” in Proceedings of the 1st International Conference on Information and Communication Security (ICICS'97 ), vol. 1334 of Lecture Notes in Computer Science, pp. 223–232, 1997. View at Google Scholar · View at Zentralblatt MATH
  6. H. M. Sun, N. Y. Lee, and T. Hwang, “Threshold proxy signatures,” IEE Proceedings: Computers and Digital Techniques, vol. 146, no. 5, pp. 259–263, 1999. View at Publisher · View at Google Scholar · View at Scopus
  7. M. S. Hwang, E. J. L. Lu, and I. C. Lin, “A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem,” IEEE Transactions on Knowledge and Data Engineering, vol. 15, no. 6, pp. 1552–1560, 2003. View at Publisher · View at Google Scholar · View at Scopus
  8. G. Wang, F. Bao, J. Zhou, and R. H. Deng, “Comments on ‘A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem’,” IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 10, pp. 1309–1311, 2004. View at Publisher · View at Google Scholar · View at Scopus
  9. W. C. Kuo and M. Y. Chen, “A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem,” in Proceedings of the 3rd International Conference on Information Technology and Applications (ICITA'05), vol. 2, pp. 576–579, July 2005. View at Scopus
  10. F. Li, Q. Xue, and Z. Cao, “Crypanalysis of Kuo and Chen's threshold proxy signature scheme based on the RSA,” in Proceedings of the 4th International Conference on Information Technology-New Generations (ITNG'07), pp. 815–818, Las Vegas, Nev, USA, April 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. G. Yong-Jun, T. Hui, and H. Fan, “A modified and practical threshold proxy signature scheme based on RSA,” in Proceedings of the 9th International Conference on Advanced Communication Technology (ICACT'07), pp. 1958–1960, Gangwon-Do, South Korea, February 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures: delegation of the power to sign messages,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 79, no. 9, pp. 1338–1353, 1996. View at Google Scholar · View at Scopus
  13. H. M. Sun, “Efficient nonrepudiable threshold proxy signature scheme with known signers,” Computer Communications, vol. 22, no. 8, pp. 717–722, 1999. View at Publisher · View at Google Scholar · View at Scopus
  14. T. Okamoto, T. Mitsuru, and E. Okamoto, Extended Proxy Signature For Smart Cards, Lecture Notes in Computer Science, Springer, New York, NY, USA, 1999.
  15. C. C. Lee, T. C. Lin, S. F. Tzeng, and M. S. Hwang, “Generalization of proxy signature based on factorization,” International Journal of Innovative Computing, Information and Control, vol. 7, no. 3, pp. 1039–1054, 2011. View at Google Scholar · View at Scopus
  16. S. F. Tzeng, C. C. Lee, and M. S. Hwang, “A batch verification for multiple proxy signature,” Parallel Processing Letters, vol. 21, no. 1, pp. 77–84, 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. M. S. Hwang, S. F. Tzeng, and S. F. Chiou, “A non-repudiable multi-proxy multi-signature scheme,” Innovative Computing, Information and Control Express Letters, vol. 3, no. 3, pp. 259–264, 2009. View at Google Scholar · View at Scopus
  18. E. J. L. Lu, M. S. Hwang, and C. J. Huang, “A new proxy signature scheme with revocation,” Applied Mathematics and Computation, vol. 161, no. 3, pp. 799–806, 2005. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  19. C. Y. Yang, S. F. Tzeng, and M. S. Hwang, “On the efficiency of nonrepudiable threshold proxy signature scheme with known signers,” Journal of Systems and Software, vol. 73, no. 3, pp. 507–514, 2004. View at Publisher · View at Google Scholar · View at Scopus
  20. S. F. Tzeng, C. Y. Yang, and M. S. Hwang, “A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification,” Future Generation Computer Systems, vol. 20, no. 5, pp. 887–893, 2004. View at Publisher · View at Google Scholar · View at Scopus
  21. S. F. Tzeng, M. S. Hwang, and C. Y. Yang, “An improvement of nonrepudiable threshold proxy signature scheme with known signers,” Computers and Security, vol. 23, no. 2, pp. 174–178, 2004. View at Publisher · View at Google Scholar · View at Scopus
  22. M. S. Hwang, S. F. Tzeng, and C. S. Tsai, “Generalization of proxy signature based on elliptic curves,” Computer Standards and Interfaces, vol. 26, no. 2, pp. 73–84, 2004. View at Publisher · View at Google Scholar · View at Scopus
  23. C. S. Tsai, S. F. Tzeng, and M. S. Hwang, “Improved non-repudiable threshold proxy signature scheme with known signers,” Informatica, vol. 14, no. 3, pp. 393–402, 2003. View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  24. L. H. Li, S. F. Tzeng, and M. S. Hwang, “Generalization of proxy signature-based on discrete logarithms,” Computers and Security, vol. 22, no. 3, pp. 245–255, 2003. View at Publisher · View at Google Scholar · View at Scopus
  25. M. S. Hwang, C. C. Lee, and S. J. Hwang, “Cryptanalysis of the Hwang-Shi proxy signature scheme,” Fundamenta Informaticae, vol. 53, no. 2, pp. 131–134, 2002. View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  26. M. S. Hwang, I. C. Lin, and E. J. L. Lu, “A secure nonrepudiable threshold proxy signature scheme with known signers,” Informatica, vol. 11, no. 2, pp. 137–144, 2000. View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  27. R. Kumar and H. K. Verma, “Secure threshold proxy signature scheme based on RSA for known signers,” Journal of Information Assurance and Security, vol. 5, no. 4, pp. 319–326, 2010. View at Google Scholar
  28. S. Katzenbeisser, Recent Advances in RSA Cryptography, Springer, New York, NY, USA, 2001.
  29. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures for delegating signing operation,” in Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48–56, March 1996. View at Scopus
  30. N. Y. Lee, T. Hwang, C. H. Wang, and O. Zhang, “Nonrepudiable proxy signature schemes,” in Proceedings of the Australasian Conference on Information Security and Privacy (ACISP'8), pp. 415–422, 1998.
  31. M. Agrawal, N. Kayal, and N. Saxena, “PRIMES is in P,” Annals of Mathematics, vol. 160, no. 2, pp. 781–793, 2004. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  32. T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, “Section 31.8: primality testing,” in Introduction to Algorithms, pp. 889–890, MIT Press, McGraw-Hill, Cambridge, Mass, USA, 2nd edition, 2001. View at Google Scholar
  33. C. T. Li, Multimedia Foresics and Security, IGI Global, 1st edition, 2008.