Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem

被引:0
|
作者
Wang, SH [1 ]
Wang, GL [1 ]
Bao, F [1 ]
Wang, J [1 ]
机构
[1] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
来源
VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY | 2004年
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Proxy signature allows original signer to delegate his/her signing capability to proxy signer such that the proxy signer can sign messages on behalf of the original signer. Based on elliptic curve, one can obtains better efficiency compared to conventional proxy signatures. But in any case, take security into account, a good signature scheme should he designed to meet its basic security requirements. In this paper, we present an original signer forgery attack on an elliptic curve based proxy signature proposed recently by Chen, Liu, and Chung. By firstly constructing a forged proxy signature key pair, the attack is successful in forging signatures on any message. An improvement is presented to be secure against the proposed attack and the efficiency is comparable to the original scheme.
引用
收藏
页码:3240 / 3243
页数:4
相关论文
共 50 条
  • [1] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Chen, TS
    Liu, TP
    Chung, YF
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
  • [2] Cryptanalysis and improvement of a proxy-protected signature scheme
    Hu, Xiaoming
    Zhang, Zhe
    Wang, Tong
    SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 363 - 366
  • [3] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui Electronic Technology Institute Information Engineering University Zhengzhou China
    Journal of Electronics, 2006, (01) : 54 - 57
  • [4] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui (Electronic Technology Institute
    Journal of Electronics(China), 2006, (01) : 54 - 57
  • [5] An efficient proxy-protected signature scheme based on factoring
    Zhou, Y
    Cao, ZF
    Chai, ZC
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 332 - 341
  • [6] Security analysis of a proxy signature scheme based on the elliptic curve cryptosystem
    Wu, Y
    Zhang, YP
    Cao, TJ
    SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 58 - 64
  • [7] A Proxy-Protected Signature Scheme Based on Finite Automaton
    Cao, Fe
    Cao, Zhenfu
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 48 - +
  • [8] A Controlled Proxy-Protected Signature Scheme with Instantaneous Revocation
    Shehata, Khaled
    Selim, Gamal
    Elgindy, Maged
    Kouta, Mohamed Mohamed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (03): : 27 - 30
  • [9] A proxy blind signature scheme based on elliptic curve with proxy revocation
    Wen-Yuan, Liu
    Feng, Tong
    Yong-An, Luo
    Feng, Zhang
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 99 - +
  • [10] New self certified proxy digital signature scheme based on elliptic curve cryptosystem
    Xiao, Youan
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 723 - 726