On the Security of a Certificateless Proxy Signature Scheme with Message Recovery

被引:4
|
作者
Shi, Wenbo [1 ]
He, Debiao [2 ]
Gong, Peng [3 ]
机构
[1] Northeastern Univ Qinhuangdao, Dept Elect Engn, Qinhuangdao 066004, Peoples R China
[2] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Hubei, Peoples R China
[3] Beijing Inst Technol, Sch Mechatron Engn, Natl Key Lab Mechatron Engn & Control, Beijing 100081, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
EFFICIENT; DELEGATION;
D O I
10.1155/2013/761694
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. It has lots of practical applications in distributed systems, grid computing, mobile agent applications, distributed shared object systems, global distribution networks, and mobile communications. Recently, Padhye et al. proposed a certificateless proxy signature scheme with message recovery and claimed the scheme is secure against both of the two types of adversaries. However, in this paper, we will show that Padhye et al.'s scheme is not secure against the Type I adversary. The analysis shows their scheme is not secure for practical applications.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] ECDLP-based certificateless proxy signature scheme with message recovery
    Padhye, Sahadeo
    Tiwari, Namita
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2015, 26 (03): : 346 - 354
  • [2] Efficient certificateless proxy signature scheme with provable security
    Seo, Seung-Hyun
    Choi, Kyu Young
    Hwang, Jung Yeon
    Kim, Seungjoo
    INFORMATION SCIENCES, 2012, 188 : 322 - 337
  • [3] A certificateless proxy ring signature scheme with provable security
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    International Journal of Network Security, 2011, 12 (02) : 92 - 106
  • [4] On the security of a certificateless proxy signature scheme in the standard model
    Zhou, Caixue
    Dong, Xiwei
    Wang, Lihua
    Li, Tao
    International Journal of Network Security, 2019, 21 (04) : 576 - 581
  • [5] Efficient Certificateless Proxy Signature Scheme
    Deng, Lunzhi
    Zeng, Jiwen
    Huang, Huawei
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2016, 27 (01) : 85 - 100
  • [6] Certificateless Proxy Blind Signature Scheme
    Yu Meisheng
    Wu Xiaojuan
    Guan Jian
    Yu Haixia
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 177 - 180
  • [7] Certificateless short proxy signature scheme
    Yuan, Y. (ymyuan@xmu.edu.cn), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [8] Designated verifier proxy signature scheme with message recovery
    Lu, RX
    Cao, ZF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1237 - 1246
  • [9] On the security of a Certificateless Signature Scheme
    Cheng, Lin
    Wen, Qiao Yan
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 965 - 968
  • [10] Security of a Certificateless Proxy Signature Scheme with Blind and Forward Secure in the Random Oracle
    Liu, Yan
    Xu, Xiaolin
    Tan, Wenan
    PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2016, : 641 - 645