Improvement on a generalized scheme of proxy signature based on elliptic curves

被引:0
|
作者
Tan, Zuowen [1 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang 330013, Peoples R China
来源
CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS | 2007年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In a generalized (t(1)/n(1)-t(2)/n(2)) proxy signature scheme with known signers, any t(1) or more original signers out of n(1) original signers (1 <= t(1) <= n(1)) can represent the original group to delegate the signing capability, and t(2) or more proxy signers Out Of n(2) proxy signers (1 <= t2 <= n(2)) can represent the proxy group to sign message on behalf of the original group. In the paper we show that Hwang et al.'s generalized proxy signature scheme is vulnerable to the original signers' forgery attack. After a malicious original group of t'(1) (t(1) <= t'(1) <= n(1)) signers obtains a proxy signature (M-w, K, AOSID, M, R, S, APSID), the original signer group can collude to generate a generalized proxy signature without the agreement of the proxy group with the identities APSID. Hwang et al.'s generalized proxy signature scheme is unable to meet nonrepudiation. We propose an improved generalized proxy signature scheme which can resist our original signer group's collusion attack.
引用
收藏
页码:677 / 681
页数:5
相关论文
共 50 条
  • [1] Generalization of proxy signature based on elliptic curves
    Hwang, MS
    Tzeng, SF
    Tsai, CS
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (02) : 73 - 84
  • [2] A proxy blind signature scheme based on elliptic curve with proxy revocation
    Wen-Yuan, Liu
    Feng, Tong
    Yong-An, Luo
    Feng, Zhang
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 99 - +
  • [3] Limited proxy signature scheme based on elliptic curve
    Wang, Xiaoming
    Fu, Fangwei
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2002, 24 (12): : 1825 - 1828
  • [4] Anonymous proxy signature scheme based on elliptic curve
    Zhu, Bao-Ping
    Chen, Shi-Yu
    Zhu, Jing
    Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2012, 36 (SUPPL.1): : 100 - 104
  • [5] An elliptic curve proxy signature scheme
    Xiao, Youan
    Zhou, Zude
    Li, Layuan
    DCABES 2006 Proceedings, Vols 1 and 2, 2006, : 1151 - 1154
  • [6] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Chen, TS
    Liu, TP
    Chung, YF
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
  • [7] A generalized proxy signature scheme based on the RSA cryptosystem
    Xue, QS
    Cao, ZF
    Qian, HF
    PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 662 - 665
  • [8] An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography
    Sun, Xue
    Xia, Mingping
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 88 - 91
  • [9] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui Electronic Technology Institute Information Engineering University Zhengzhou China
    Journal of Electronics, 2006, (01) : 54 - 57
  • [10] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui (Electronic Technology Institute
    Journal of Electronics(China), 2006, (01) : 54 - 57