Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem

被引:0
作者
Wang, SH [1 ]
Wang, GL [1 ]
Bao, F [1 ]
Wang, J [1 ]
机构
[1] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
来源
VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY | 2004年
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Proxy signature allows original signer to delegate his/her signing capability to proxy signer such that the proxy signer can sign messages on behalf of the original signer. Based on elliptic curve, one can obtains better efficiency compared to conventional proxy signatures. But in any case, take security into account, a good signature scheme should he designed to meet its basic security requirements. In this paper, we present an original signer forgery attack on an elliptic curve based proxy signature proposed recently by Chen, Liu, and Chung. By firstly constructing a forged proxy signature key pair, the attack is successful in forging signatures on any message. An improvement is presented to be secure against the proposed attack and the efficiency is comparable to the original scheme.
引用
收藏
页码:3240 / 3243
页数:4
相关论文
共 50 条
[41]   Cryptanalysis of an identity based proxy multi-signature scheme [J].
Li, Fagen ;
Zhou, Shijie ;
Sun, Rong .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) :1820-1823
[42]   A Hyperelliptic Curve Cryptosystem Based Proxy Promised Signcryption Scheme [J].
Khan, Farhad Ullah ;
Algarni, Fahad ;
Ullah, Insaf ;
Karamti, Hanen ;
Manzar, Muhammad Anwaar ;
Alzahrani, Ahmed Saeed ;
Aziz, Muhammad Adnan ;
Khan, Muhammad Asghar .
SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
[43]   A new proxy multi-signature scheme and the elliptic curve cryptography [J].
Cheng, Xu ;
Li, MingChu ;
Zhao, Kaiqin .
WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 8, 2005, :180-184
[44]   A threshold signature scheme based on the elliptic curve cryptosystem [J].
Chen, TS .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) :1119-1134
[45]   A efficient (t,n) threshold proxy signature scheme based on elliptic curve cryptosystems [J].
Lu, Dianjun ;
Zhang, Bingru ;
Wang, Yun ;
Li, Xinyan .
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, :4586-+
[46]   A Provably Secure Proxy Signature Scheme with Multiple Threshold Values Based on Elliptic Curve [J].
Shao, Zuhua .
PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, :58-61
[47]   Cryptanalysis of a Batch Proxy Quantum Blind Signature Scheme [J].
Cai, Xiao-Qiu ;
Zheng, Yu-Hui ;
Zhang, Rui-Ling .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2014, 53 (09) :3109-3115
[48]   Cryptanalysis of a Quantum Proxy Weak Blind Signature Scheme [J].
Ke-Jia Zhang ;
Heng-Yue Jia .
International Journal of Theoretical Physics, 2015, 54 :582-588
[49]   Cryptanalysis of a Quantum Proxy Weak Blind Signature Scheme [J].
Zhang, Ke-Jia ;
Jia, Heng-Yue .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2015, 54 (02) :582-588
[50]   Cryptanalysis of new proxy blind signature scheme with warrant [J].
Li Jiguo ;
Zhang Yichen ;
Yang Songtao .
ADVANCES IN COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2005, VOLS 4 A & 4 B, 2005, 4A-4B :1741-1744