Source: The Journal of Systems and Software, Vol. 73, 2004, pp.507–514

Slides:



Advertisements
Similar presentations
E W H A W U New Nominative Proxy Signature Scheme for Mobile Communication April Seo, Seung-Hyun Dept. of Computer Science and.
Advertisements

Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Computer and Information Security 期末報告 學號 姓名 莊玉麟.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
1 Security analysis of an enhanced authentication key exchange protocol Authors : H.Y. Liu, G.B. Horng, F.Y. Hung Presented by F.Y. Hung Date : 2005/5/20.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
A New Multi-Proxy Multi- Signature Scheme Source: National Computer Symposium, vol. F, Taiwan, pp , 2001 Author: Shin-Jia Hwang and Chiu-Chin Chen.
1 An ID-based multisignature scheme without reblocking and predetermined signing order Chin-Chen Chang, Iuon-Chang Lin, and Kwok-Yan Lam Computer Standards.
An Improved Smart Card Based Password Authentication Scheme with Provable Security Source:Computer Standards & Interfaces, Vol. 31, No. 4, pp ,
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
Identity Base Threshold Proxy Signature Jing Xu, Zhenfeng Zhang, and Dengguo Feng Form eprint Presented by 魏聲尊.
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
Improvement of Hwang-Lo-Lin scheme based on an ID-based cryptosystem No author given (Korea information security Agency) Presented by J.Liu.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Bob can sign a message using a digital signature generation algorithm
1 Lect. 15 : Digital Signatures RSA, ElGamal, DSA, KCDSA, Schnorr.
1 Authentication and Digital Signature Schemes and Their Applications to E-commerce ( 身份認證與數位簽章技術及其在電子商務上的應用 ) Advisor: Chin-Chen Chang 1, 2 Student: Ya-Fen.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
A Secure Identification and Key Agreement Protocol with User Anonymity (SIKA) Authors: Kumar Mangipudi and Rajendra Katti Source: Computers & Security,
Linkability of Some Blind Signature Schemes Swee-Huay Heng 1, Wun-She Yap 1 Khoongming Khoo 2 1 Multimedia University, 2 DSO National Laboratories.
1 一個新的代理簽章法 A New Proxy Signature Scheme 作 者 : 洪國寶, 許琪慧, 郭淑娟與邱文怡 報 告者 : 郭淑娟.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Cryptanalysis of Some Proxy Signature Schemes without Certificates Wun-She Yap, Swee-Huay Heng Bok-Min Goi Multimedia University.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
Prepared by Dr. Lamiaa Elshenawy
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
TOMIN: Trustworthy Mobile Cash with Expiration-date Attached Author: Rafael Martínez-Peláez and Francisco Rico-Novella. Source: Journal of Software, 2010,
Cryptography and Network Security Chapter 13
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Overview Modern public-key cryptosystems: RSA
CS580 Internet Security Protocols
Reporter :Chien-Wen Huang
Proxy Blind Signature Scheme
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
Key Substitution Attacks on Some Provably Secure Signature Schemes
Author : Guilin Wang Source : Information Processing Letters
Public-Key Cryptography RSA Rivest-Shamir-Adelmann Public-Key System
Cryptanalysis on Mu–Varadharajan's e-voting schemes
A secure and traceable E-DRM system based on mobile device
An efficient threshold RSA digital signature scheme
Certificateless signature revisited
CS480 Cryptography and Information Security
Security of a Remote Users Authentication Scheme Using Smart Cards
A Novel Group Key Transfer Protocol
Chapter 9 Security 9.1 The security environment
Chapters 14,15 Security.
IEEE TRANSACTIONS ON INFORMATION THEORY, JULY 1985
Chair Professor Chin-Chen Chang Feng Chia University
Key agreement in wireless sensor network
Practical E-Payment Scheme
Digital Signatures…!.
Digital Signatures.
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
Chapters 14,15 Security.
A New Provably Secure Certificateless Signature Scheme
El Gamal and Diffie Hellman
Chapter 13 Digital Signature
Security of Wang-Li Threshold Signature Scheme
Authors: Yuh-Min TSENG, Tsu-Yang WU, Jui-DiWU
Cryptanalysis of Tseng et al.’s authenticated encrption schemes
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Cryptology Design Fundamentals
Improved Authenticated Multiple-Key Agreement Protocol
Presentation transcript:

On the efficiency of nonrepudiable threshold proxy signature scheme with known signers Source: The Journal of Systems and Software, Vol. 73, 2004, pp.507–514 Author: Cheng-Ying Yang ; Shiang-Feng Tzeng ; Min-Shiang Hwang Advisor:Dr. Chang, Chin-Chen Reporter:Wang, Shing-Shoung Date :2004/11/23 2004/11/23

Outline Review of Hsu et al.’s scheme Improvement of Hsu et al.’s scheme Security Analysis Conclusions 2004/11/23

Review of Hsu et al.’s scheme Divides the sheme into 4 phases as followung: system authourity, SA (1) (1) (3) (3) original signer (2) (2) (t,n) proxy group (3) clerk (3) verifier (4) (1)Secret share generation phase (2)Proxy share generation phase (3)Proxy signature generation phase (4)Proxy signature verification phase t:# of original signer n:# of proxy signer 2004/11/23

Review of Hsu et al.’s scheme(Cont.) System initialing: System Authority(SA) selects and publishes the follow parameters: p a large prime q a large prime factor of p-1 g a generator in GF(p) of order q h(.) a One-way hash function mw a warrant which records the identities of the original signer and the proxy signers of the proxy group, the parameters t and n, and the valid delegation time, etc. ASID (Actual Signers’ ID) the identities of the actual signers. 2004/11/23

Review of Hsu et al.’s scheme(Cont.) Notation: Pi each user P0 original signer G={P1,P2,P3...,Pn} the proxy group of n proxy signers. the public identifier user i’s private key user i’s public key 2004/11/23

Review of Hsu et al.’s scheme(Cont.) 1.Secret share generation phase: (1)chooses the group private key XG. (2)computes the public key YG=gXG mod p (3)randomly generates a (t-1) polynomial f(v)= XG +a1v+a2v2+...+at-1vt-1 mod q where ai Zq(i=1,2,...,t-1) (4)for each Pi G,computes the secret share γi=f(vi) τi=gγi mod p vi:public identifier for Pi (5)separately sends γi to Pi via a secure channel (6)publishes all τi’s 2004/11/23

Review of Hsu et al.’s scheme(Cont.) Receives σi,each Pi can check the following equation: if true, Pi computes σi’= σi +γih(mw||K)mod q 2.Proxy share generation phase : (1)chooses a random integer k Z*q. and computes K=gkmod p (2)computes the proxy signature key as σ=k+x0h(mw||K)mod q (3)chooses a polynomial f(v)=σ+b1v+b2v2+...+bt-1vt-1 mod q where the random integers bj Zq(i=1,2,...,t-1) (4)publishes Bj=gbj mod p for j=1,2,...,t-1 (5)sends σi=f0(vi) to Pi via a secure channel (6)broadcasts (mw,K) to G How to verify? 2004/11/23

Review of Hsu et al.’s scheme(Cont.) 3.Proxy signature generation phase : given a message m,D ={P1,P2,P3...,Pt} (1)each Pi D chooses a random integer ki Z*q and broadcasts ri=gki mod p (2)obtains all ri , si=kiR+(Liσi’+xi)h(R||ASID||m)mod q where (3)Upon receiving si, clerk checks if it holds(ri,si) is the valid individual signature of m the proxy signature is (R,S,K,mw,ASID) 2004/11/23

Review of Hsu et al.’s scheme(Cont.) 4.Proxy signature verification phase: if the proxy signature (R,S,K,mw,ASID) from m is valid. 2004/11/23

Improvement of Hsu et al.’s scheme Divides the sheme into 3 phase as followung: (2) (2) original signer (1) (1) (t,n) proxy group (2) clerk (2) verifier (3) (1)Proxy share generation phase (2)Proxy signature generation phase (3)Proxy signature verification phase 2004/11/23

Improvement of Hsu et al.’s scheme(Cont.) 1.Proxy share generation phase: (1)chooses a random integer k Z*q. and computes K=gkmod p (2)computes the proxy signature key as σ=k+x0h(mw||K)mod q (3)broadcasts (σ,mw,K) to G How to verify? Check 2004/11/23

Improvement of Hsu et al.’s scheme(Cont.) 2.Proxy signature generation phase given a message m,D ={P1,P2,P3...,Pt} (1)each Pi D chooses a random integer ki Z*q and broadcasts ri=gki mod p (2)obtains all ri , si=kiR+(t-1σi’+xi)h(R||ASID||m)mod q where t:# of actual proxy signers. (3)Upon receiving si, clerk checks if it holds(ri,si) is the valid individual signature of m the proxy signature is (R,S,K,mw,ASID) 2004/11/23

Improvement of Hsu et al.’s scheme(Cont.) 3.Proxy signature verfication phase (1)according to mw and ASID, we get the proxy and original signer’s public key. and know who is the original signer. (2)verify t. (3)verify the following equation: if true the proxy signature is (R,S,K,mw,ASID) of m is valid. 2004/11/23

Security Analysis Security analysis: 1.Plaintext attack 2.Conspiracy attack 3.Forgery attack given m’,ASID’,V0’ 2004/11/23

Conclusions The improved scheme has the same property that any t or more proxy signers may work together to generate a valid proxy signature on behalf of the original signer. The improved scheme also provides the ability to identity the actual proxy signers for avoiding the abuse of the signing capability. the improved scheme satisfies the nonrepudiation property. 2004/11/23