数学季刊(英文版)
數學季刊(英文版)
수학계간(영문판)
CHINESE QUARTERLY JOURNAL OF MATHEMATICS
2010年
3期
459-463
,共5页
cryptanalysis%impersonate attacks%threshold-proxy threshold-signature
Recently,Hwang et al.proposed a(t,n)threshold-proxy(c,m)threshold signature schemes,in which only any t or more original signers of n original signers can authorize a proxy group of m proxy signers and then only c or more proxy signers can co operatively generate threshold-proxy threshold-signature.In this scheme,they claimed that original signers cannot forge the proxy signature and the proxy signers cannot forge signature on behalf of the original signers.However,in this paper,we will give a attack to show that their scheme can not resist impersonation attacks.