Cryptanalysis of A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
نویسندگان
چکیده
rant as a part information of verification. Furthermore, in terms of proxy delegation steps, some proxy signature schemes are non-interactive [46] and some schemes [7] are interactive. No matter what kind of proxy signature Recently, Shum and Wei proposed an enhancement to the Lee et Proxy signature such that the schemes, a proxy scheme provide good proxy signer's identity is hidden behind an alias. In security properties, this paper, we show that Shum and Wei's enhancement is insecure against the original signer's forgery. In other words, their scheme does not possess the strong unforgeproxy signature sclleme should provide: ability security requirement. Lee et al. properties that a strong Strong Unforgeability: Only the legitimate proxy
منابع مشابه
Further Cryptanalysis of some Proxy Signature Schemes
Proxy signature is a signature that an original signer delegates his or her signing capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. However, Sun et al. [7] showed that the proxy and multi-proxy signatures of Lee et al. [3], and the strong proxy signature scheme with proxy signer privacy protection of Shum et al. [6] are not against t...
متن کاملRemarks on the security of the strong proxy signature scheme with proxy signer privacy protection
In 1996, Mambo et al. introduced the proxy signature scheme for digital applications to delegate the signing capability to a proxy signer. Various constructions were made to devise a strong nondesignated proxy signature scheme. In 2002, Shum and Wei proposed an extended scheme to hide the identity of the proxy signer. A Trusted Authority (TA) can reveal the proxy signer’s identity if required. ...
متن کاملA Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
-Mambo, et al. [3] discussed the delegation of signature power to a proxy signer. Lee, et al. [5] constructed a strong non-designated proxy signature scheme in which the proxy signer had strong nonrepudiation. In this paper, we present an enhancement to their scheme such that the identity of the proxy signer is hidden behind an alias. The identity can be revealed only by the alias authority. We...
متن کاملA Secure Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
A proxy signature scheme enables an entity to delegate its signing rights to another entity. Since the proxy signature concept was proposed by Mambo et al., many variant schemes have been appeared. In this paper, we propose a new proxy signature scheme with a proxy signer's privacy protection. In proxy signer's privacy scenario, the identity of the proxy signer cannot be revealed in a proxy sig...
متن کاملA Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme
In a proxy signature scheme, one original signer delegates a proxy signer to sign messages on behalf of the original signer. When the proxy signature is created, the proxy signer generates valid proxy signatures on behalf of the original signer. Based on Cha and Cheon’s ID-based signature scheme, a model of designated-verifier proxy signature scheme from the bilinear pairing is proposed. The pr...
متن کامل