Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes

نویسندگان

  • Tianjie Cao
  • Xianping Mao
چکیده

A proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer. In this paper, we demonstrate that a number of discrete logarithm based proxy signature schemes are vulnerable to an original signer’s forgery attack. In this attack, a malicious original signer can impersonate a proxy signer and produce a forged proxy signature on a message. A third party will incorrectly believe that the proxy signer was responsible for generating the proxy signature. This contradicts the strong unforgeability property that is required of proxy signatures schemes. We show six proxy signature schemes vulnerable to this attack including Lu et al.’s proxy blind multi-signature scheme, Xue and Cao’s proxy blind signature scheme, Fu et al. and Gu et al.’s anonymous proxy signature schemes, Dai et al. and Huang et al.’s nominative proxy signature schemes are all insecure against the original signer’s forgery.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection

rant as a part information of verification. Furthermore, in terms of proxy delegation steps, some proxy signature schemes are non-interactive [46] and some schemes [7] are interactive. No matter what kind of proxy signature Recently, Shum and Wei proposed an enhancement to the Lee et Proxy signature such that the schemes, a proxy scheme provide good proxy signer's identity is hidden behind an a...

متن کامل

Improvement of a Forward-Secure Multi-Proxy Signature Scheme

This paper shows some insecurities in Xu’s forward secure multi-proxy signature scheme. There are two kinds of attacks on this scheme: (1) anyone can forge some certain messages which to be sign and cannot detect by the signature verifier. (2) This scheme can’t resist the dishonest signer forgery attack by forging its own public key. After that, the paper proposed two new forward-secure multi-p...

متن کامل

An Efficient Self Proxy Signature Scheme Based on Elliptic Curve Discrete Logarithm Problems

Self proxy signature is a type of proxy signature wherein, the original signer delegates the signing rights to himself, there by generating temporary public and private key pairs for himself. The aim of self proxy is to protect the signer's permanent secret key. Most of proposed self proxy signature scheme have been based on discrete logarithms which required for a protocol to generate and veri...

متن کامل

A certificate-based proxy signature with message recovery without bilinear pairing

In this paper, we propose the first provable secure certificate-based proxy signature with message recovery without bilinear pairing. The notion of certificate-based cryptography was initially introduced by Gentry in 2003, in order to simplify certificate management in traditional public key cryptography (PKC) and to solve the key escrow problem in identity-based cryptosystems. To date, a numbe...

متن کامل

Cryptanalysis of Li et al.’s Proxy Signature Scheme

This work shows that the security improvement of Li et al. for Park and Lee’s nominative proxy signature scheme is still insecure against the original signer’s forgery. The problem within Li et al. scheme is that the verifier cannot judge the correctness of the parameter generated by the original signer from the received signature. Key-Words: digital signature, authentication, hash function, di...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2007