Cryptanalysis of Zhou et al.'s proxy-protected signature schemes

被引:14
|
作者
Park, JH
Kang, BG
Han, JW
机构
[1] Natl Secur Res Inst, Taejon 305350, South Korea
[2] Korea Adv Inst Sci & Technol, Dept Math, Taejon 305701, South Korea
关键词
cryptography; proxy signature scheme; signature scheme; RSA assumption; security analysis;
D O I
10.1016/j.amc.2004.10.051
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Quite recently, Zhou et al. proposed two proxy-protected signature schemes based oil the RSA assumption and the hardness of integer factorization, respectively. They also provided security proofs for each signature scheme in the random oracle model. In this paper, we show that both schemes are not secure and suggest a method for fixing the security flaw. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:192 / 197
页数:6
相关论文
共 50 条
  • [1] On the proxy-protected property of Chen et al.'s proxy multisignature schemes
    Huang, Pei-Hui
    Wen, Hsiang-An
    Wang, Chih-Hung
    Hwang, Tzonelih
    INFORMATICA, 2007, 18 (01) : 55 - 60
  • [2] Security of Lu et al.'s proxy-protected signature scheme
    Park, JH
    Kang, BG
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1010 - 1015
  • [3] Cryptanalysis and improvement of a proxy-protected signature scheme
    Hu, Xiaoming
    Zhang, Zhe
    Wang, Tong
    SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 363 - 366
  • [4] Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Wang, SH
    Wang, GL
    Bao, F
    Wang, J
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3240 - 3243
  • [5] Provably secure proxy-protected signature schemes based on factoring
    Zhou, Y
    Cao, ZF
    Lu, RX
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (01) : 83 - 98
  • [6] Provably secure proxy-protected signature schemes based on RSA
    Shao, Zuhua
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) : 497 - 505
  • [7] Improvement on Li et al.'s generalization of proxy signature schemes
    Hwang, SJ
    Chan, CC
    COMPUTERS & SECURITY, 2004, 23 (07) : 615 - 619
  • [8] Attacks on provably secure proxy-protected signature schemes based on factoring
    Wu, Chia-Chi
    Chang, Chin-Chen
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (02): : 193 - 204
  • [9] Proxy-protected signature secure against the undelegated proxy signature attack
    Liu, Yu-Chuan
    Wen, Hsiang-An
    Lin, Chun-Li
    Hwang, Tzonelih
    COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (03) : 177 - 185
  • [10] Cryptanalysis of Tseng et al.'s authenticated encryption schemes
    Qi, X
    Xiu, YY
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 158 (01) : 1 - 5