Strong Identity-Based Proxy Signature Schemes, Revisited

被引:2
作者
Liu, Weiwei [1 ]
Mu, Yi [2 ]
Yang, Guomin [2 ]
Tian, Yangguang [3 ]
机构
[1] North China Univ Water Resources & Elect Power, Sch Math & Stat, Zhengzhou 450046, Henan, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW 2522, Australia
[3] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
关键词
SECURE;
D O I
10.1155/2018/6925019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy signature is a useful cryptographic primitive that has been widely used in many applications. It has attracted a lot of attention since it was introduced. There have been lots of works in constructing efficient and secure proxy signature schemes. In this paper, we identify a new attack that has been neglected by many existing proven secure proxy signature schemes. We demonstrate this attack by launching it against an identity-based proxy signature scheme which is proven secure. We then propose one method that can effectively prevent this attack. The weakness in some other proxy signature schemes can also be fixed by applying the same method.
引用
收藏
页数:11
相关论文
共 24 条
[1]  
[Anonymous], 1997, INT WORKSH INF SEC
[2]   Secure Proxy Signature Schemes for Delegation of Signing Rights [J].
Boldyreva, Alexandra ;
Palacio, Adriana ;
Warinschi, Bogdan .
JOURNAL OF CRYPTOLOGY, 2012, 25 (01) :57-115
[3]  
Calvelli C., P 1992 COMP SEC FDN, VV, P92
[4]   Context Aware Ubiquitous Biometrics in Edge of Military Things [J].
Castiglione, Aniello ;
Choo, Kim-Kwang Raymond ;
Nappi, Michele ;
Ricciardi, Stefano .
IEEE CLOUD COMPUTING, 2017, 4 (06) :16-20
[5]  
Fangguo Z., 2003, CITESEER
[6]  
Foster I., 1998, 5th ACM Conference on Computer and Communications Security, P83, DOI 10.1145/288090.288111
[7]  
Fuchsbauer G, 2008, LECT NOTES COMPUT SC, V5229, P201, DOI 10.1007/978-3-540-85855-3_14
[8]  
Huang XY, 2006, LECT NOTES COMPUT SC, V4325, P473
[9]   An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment [J].
Jia, Xiaoying ;
He, Debiao ;
Liu, Qin ;
Choo, Kim-Kwang Raymond .
AD HOC NETWORKS, 2018, 71 :78-87
[10]  
Kim S., 1997, Information and Communications Security. First International Conference, ICIS '97. Proceedings, P223, DOI 10.1007/BFb0028478