Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme

被引:0
作者
Kar, Jayaprakash [1 ]
机构
[1] LNM Inst Informat Technol, Dept Comp Sci & Engn, Jaipur 302031, Rajasthan, India
来源
NETWORK AND SYSTEM SECURITY | 2017年 / 10394卷
关键词
Chosen-message attack; Bilinear map; Digital signature; Public key infrastructures;
D O I
10.1007/978-3-319-64701-2_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Proxy multi-signature scheme allows an authorized proxy signer to sign on a message on behalf of a group of original signers. Recently Cao and Cao proposed an identity-based proxy signature scheme and claimed that the scheme is provably secure in random oracle model. In this paper we have reviewed the scheme and proven that the scheme is vulnerable to chosen message attack under the defined security model. To prevent this attack, we propose an improvement over existing identity-based signature scheme.
引用
收藏
页码:291 / 300
页数:10
相关论文
共 16 条
[1]  
[Anonymous], CRYPTOGRAPHY INFORM
[2]  
[Anonymous], 2001, PROC INT C INF TECHN, DOI DOI 10.1007/3-540-45600-7-49
[3]  
[Anonymous], 2000, P 10 NAT C INF SEC H
[4]  
[Anonymous], 2014, INT J NETWORK SECURI, V16, P26
[5]  
[Anonymous], 1997, INT WORKSH INF SEC
[6]  
Awasthi AmitK., 2005, T CRYPTOLOGY, V2, P5
[7]   A law-abiding peer-to-peer network for free-software distribution [J].
Bakker, A ;
van Steen, M ;
Tanenbaum, AS .
IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2001, :60-67
[8]   A secure identity-based proxy multi-signature scheme [J].
Cao, Feng ;
Cao, Zhenfu .
INFORMATION SCIENCES, 2009, 179 (03) :292-302
[9]   New multi-proxy multi-signature schemes [J].
Hwang, SJ ;
Chen, CC .
APPLIED MATHEMATICS AND COMPUTATION, 2004, 147 (01) :57-67
[10]  
Kar Jayaprakash, 2017, ICIC Express Letters, V11, P619