Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem

被引:0
作者
Wang, SH [1 ]
Wang, GL [1 ]
Bao, F [1 ]
Wang, J [1 ]
机构
[1] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
来源
VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY | 2004年
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Proxy signature allows original signer to delegate his/her signing capability to proxy signer such that the proxy signer can sign messages on behalf of the original signer. Based on elliptic curve, one can obtains better efficiency compared to conventional proxy signatures. But in any case, take security into account, a good signature scheme should he designed to meet its basic security requirements. In this paper, we present an original signer forgery attack on an elliptic curve based proxy signature proposed recently by Chen, Liu, and Chung. By firstly constructing a forged proxy signature key pair, the attack is successful in forging signatures on any message. An improvement is presented to be secure against the proposed attack and the efficiency is comparable to the original scheme.
引用
收藏
页码:3240 / 3243
页数:4
相关论文
共 50 条
[21]   Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem [J].
Yang, Jen-Ho ;
Chang, Chin-Chen .
ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, :3-+
[22]   The efficient proxy-protected proxy-signcryption scheme based on the ECKCDSA for mobile environment [J].
Kim, KS ;
Kim, JB ;
Yang, HK .
6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS II, 2002, :26-30
[23]   An Efficient Forward-Secure Proxy-Protected Signature Scheme Based on the Strong RSA Assumption [J].
Naji, Akram A. M. ;
Abu Hasan, Yahya .
ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, :259-264
[24]   Nonrepudiable threshold proxy signature scheme based on elliptic curve cryptography [J].
Yuan, Ding ;
Fan, Pingzhi .
Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2007, 42 (01) :8-12
[25]   Security of Lu et al.'s proxy-protected signature scheme [J].
Park, JH ;
Kang, BG .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) :1010-1015
[26]   Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem [J].
Li, Fengying ;
Xue, Qingshui .
2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, :423-426
[27]   Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem [J].
Li, Fengying ;
Xue, Qingshui .
COMPUTING AND INTELLIGENT SYSTEMS, PT IV, 2011, 234 :101-+
[28]   A generalized proxy signature scheme based on the RSA cryptosystem [J].
Xue, QS ;
Cao, ZF ;
Qian, HF .
PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 :662-665
[29]   Cryptanalysis of threshold proxy signature scheme based on factoring [J].
Liu Feng ;
Gao Dong-Mei ;
Cui Guang-Hai .
ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, :473-+
[30]   Attacks on provably secure proxy-protected signature schemes based on factoring [J].
Wu, Chia-Chi ;
Chang, Chin-Chen .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (02) :193-204