An improved designated-verifier proxy signature scheme

被引:0
|
作者
Zhang, Jianhong [1 ]
机构
[1] N China Univ Technol, Coll Sci, Beijing 100041, Peoples R China
关键词
digital signature; designated-verifier proxy signature; security analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a special signature, proxy signature allows a entity called original signer to delegate his signing capability to another entity to produce signature on behalf of him. By combining the ideas of proxy signatures and designated-verifier signatures, G:L.Wang et.al. proposed a strong designated-verifier proxy signature scheme (for short DVP) and claimed that the security of their scheme was based on the computational Diffie-Hellman assumption. Unfortunately, in the paper, we give security analysis of Wang et.al's strong designated-verifier proxy signature scheme and show that their scheme is forgeable. Namely, an adversary can forge a DVP signature on arbitrary message m without the knowledge of the proxy secret key xp or the designated verifier's secret key x(C). At the same time, we give two attacks on the Strong designated-verifier proxy signature scheme. Finally, we give an improved scheme to overcome the above forgery attacks, and show the scheme to be secure in random oracle model.
引用
收藏
页码:77 / 82
页数:6
相关论文
共 50 条
  • [31] Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks
    Lei He
    Jianfeng Ma
    Limin Shen
    Dawei Wei
    Science China Information Sciences, 2021, 64
  • [32] Universal Designated-Verifier Signatures
    Steinfeld, R
    Bull, L
    Wang, HX
    Pieprzyk, J
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 523 - 542
  • [33] Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks
    Lei HE
    Jianfeng MA
    Limin SHEN
    Dawei WEI
    Science China(Information Sciences), 2021, 64 (01) : 79 - 93
  • [34] A Designated Verifier Proxy Signature Scheme with Fast Revocation without Random Oracles
    Beheshti-Atashgah, M.
    Gardeshi, M.
    Bayat, M.
    DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS, PT I, 2011, 166 : 535 - +
  • [35] Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks
    He, Lei
    Ma, Jianfeng
    Shen, Limin
    Wei, Dawei
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (01)
  • [36] An Obfuscatable Designated Verifier Signature Scheme
    Shi, Yang
    Fan, Hongfei
    Liu, Qin
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (02) : 271 - 285
  • [37] On the security of group signature scheme and designated verifier signature scheme
    Zhang, Jianhong
    Geng, Qin
    PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 351 - 358
  • [38] A Strong Designated-Verifier Ring Signature Scheme Providing One-Out-of-All Signer Anonymity
    Hwang, Shin-Jia
    Cheng, Kai-Lung
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (02): : 357 - 365
  • [39] Designated-verifier proxy signatures for e-commerce from bilinear pairings
    Li, XX
    Chen, KF
    Li, SQ
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1249 - 1252
  • [40] A New Designated Verifier Proxy Signature in Standard Model
    Guo, Li-Hong
    Wu, Hai-Tao
    Yang, Qing
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 148 - 151