On the Security of Some Proxy Signature Schemes
نویسندگان
چکیده
Digital signature scheme is an important research topic in cryptography. An ordinary digital signature scheme allows a signer to create signatures of documents and the generated signatures can be verified by any person. A proxy signature scheme, a variation of ordinary digital signature scheme, enables a proxy signer to sign messages on behalf of the original signer. To be used in different applications, many proxy signatures were proposed. In this paper, we review Lee et al.’s strong proxy signature scheme, multi-proxy signature scheme, and its application to a secure mobile agent, Shum and Wei’s privacy protected strong proxy signature scheme, and Park and Lee’s nominative proxy signature scheme, and show that all these proxy signature schemes are insecure against the original signer’s forgery. In other words, these schemes do not possess the unforgeability property which is a desired security requirement for a proxy signature scheme.
منابع مشابه
An Enhanced Proxy Blind Signature with two Intractable Problems
A proxy blind signature scheme is combination of two signature schemes particularly proxy signature and blind signature. In this signature scheme the original signer delegate his/her signing authority to some other entity named proxy signer. The proxy signer signs the documents or messages, but he cannot be able to find any link between the blind signature and the identity of the signature requ...
متن کاملDouble voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملCryptanalysis of A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
rant as a part information of verification. Furthermore, in terms of proxy delegation steps, some proxy signature schemes are non-interactive [46] and some schemes [7] are interactive. No matter what kind of proxy signature Recently, Shum and Wei proposed an enhancement to the Lee et Proxy signature such that the schemes, a proxy scheme provide good proxy signer's identity is hidden behind an a...
متن کاملSome Proxy Signature and Designated verifier Signature Schemes over Braid Groups
Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed sch...
متن کاملOn the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
Abstract A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can cooperatively sign messages on behalf of the original signer. In the paper, we review the security of some nonrepudiable threshold proxy signature schemes with known signers. We show that Sun’s threshold proxy...
متن کاملGeneralization of proxy signature-based on discrete logarithms
In the past few years, many excellent studies on proxy signature schemes have been published. Yet, traditional proxy signature schemes are mainly aimed at dealing with one or two separate proxy conditions each. In this article, the authors shall present a generalized version of the (t1/n1 – t2/n2) proxy signature scheme based on the discrete logarithms that can be applied to every proxy situati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2003 شماره
صفحات -
تاریخ انتشار 2003