Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem

被引:0
作者
Wang, SH [1 ]
Wang, GL [1 ]
Bao, F [1 ]
Wang, J [1 ]
机构
[1] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
来源
VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY | 2004年
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Proxy signature allows original signer to delegate his/her signing capability to proxy signer such that the proxy signer can sign messages on behalf of the original signer. Based on elliptic curve, one can obtains better efficiency compared to conventional proxy signatures. But in any case, take security into account, a good signature scheme should he designed to meet its basic security requirements. In this paper, we present an original signer forgery attack on an elliptic curve based proxy signature proposed recently by Chen, Liu, and Chung. By firstly constructing a forged proxy signature key pair, the attack is successful in forging signatures on any message. An improvement is presented to be secure against the proposed attack and the efficiency is comparable to the original scheme.
引用
收藏
页码:3240 / 3243
页数:4
相关论文
共 50 条
[31]   Efficient proxy multisignature schemes based on the elliptic curve cryptosystem [J].
Chen, TS ;
Chung, YF ;
Huang, GS .
COMPUTERS & SECURITY, 2003, 22 (06) :527-534
[32]   An improvement of proxy multi-signature schemes based on elliptic curve cryptosystem in Internet environment [J].
Chen, TS ;
Chung, YF ;
Liu, TP ;
Hwang, GS .
6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS II, 2002, :505-510
[33]   A New Digital Multilevel Proxy Signature Scheme Based on Elliptic Curve Cryptography [J].
QIN Yanlin WU Xiaoping School of Information Security University of Naval Engineering Wuhan Hubei China .
WuhanUniversityJournalofNaturalSciences, 2006, (06) :1704-1706
[34]   Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection [J].
Sun, HM ;
Hsieh, BT .
37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, :474-476
[35]   Cryptanalysis on a proxy multi-signature scheme [J].
Cao, Feng ;
Cao, Zhenfu .
FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, :117-+
[36]   Cryptanalysis and improvement of a threshold proxy signature scheme [J].
Hu, Jianghong ;
Zhang, Jianzhong .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) :169-173
[37]   Cryptanalysis and improvement of a new proxy signature scheme [J].
Lu, Rong-Bo ;
He, Da-Ke ;
Wang, Chang-Ji ;
Miao, Xiang-Hua .
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2007, 29 (10) :2529-2532
[38]   Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme [J].
Tan, Zuo-Wen ;
Liu, Zhuo-Jun .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2009, 25 (02) :619-631
[39]   An improved threshold proxy signature scheme based on the RSA cryptosystem [J].
Xue, QS ;
Cao, ZF ;
Tang, FL .
PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, 2004, :901-907
[40]   Cryptanalysis and improvement of a ECDLP based proxy blind signature scheme [J].
Chande, Manoj Kumar ;
Lee, Cheng-Chi ;
Li, Chun-Ta .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (01) :23-34