Cryptanalysis of Lee-Hwang-Yang blind signature scheme

نویسندگان

  • Chun-I Fan
  • D. J. Guan
  • Chih-I Wang
  • Dai-Rui Lin
چکیده

In 2005, Lee et al. proposed a blind signature scheme based on the discrete-logarithm problem to achieve the untraceability or unlinkability property. However, the scheme will be demonstrated as not being secure in this manuscript. We design an attack on the scheme such that a signature requester can obtain more than one valid signatures by performing only one round of the protocol. It violates an important security requirement of blind signatures.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of the Hwang-Shi Proxy Signature Scheme

Recently, Hwang and Shi proposed an efficient proxy signature scheme without using one-way hash functions. In their scheme, an original signer needn’t send a proxy certificate to a proxy signer through secure channels. However, there are two public key substitution methods can be used to attack their scheme. In this article, we show that their scheme is vulnerable to the public key substitution...

متن کامل

An Attack on Untraceable Blind Signature Scheme 不可追蹤式盲簽章機制之攻擊法

* This research is partially supported by the National Science Council, Taiwan, R.O.C., under grant NSC92-2213-E-110-035. Abstract Hwang, Lee, and Lai introduced a new blind signature scheme based on RSA cryptosystem. In this paper, their scheme is demonstrated as being insecure and an improved scheme against the attack is proposed. In addition, Hwang, Lee, and Lai’s comments on Fan’s blind sig...

متن کامل

Cryptanalysis of a threshold proxy signature with known signers

A scheme of threshold proxy signature with known signers was proposed by Hwang et al. In their scheme, the receiver can identify the proxy signers that actually generated a proxy signature. Tzeng et al. demonstrated that this signature scheme is insecure and proposed an improvement to mend the information leakage. This paper shows that the improved scheme is still insecure under the original si...

متن کامل

Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem

Abstract. With the help of a blind signature scheme, a requester can obtain a signature on a message from a signer such that the signer knows nothing about the content of the messages and is unable to link the resulting message-signature pair; namely, a blind signature scheme can achieve both blindness and untraceability. Due to the above properties, the blind signature scheme can be used in cr...

متن کامل

Cryptanalysis of a Threshold Proxy Signature Scheme∗

A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group of n proxy signers to sign messages on behalf of an original signer. Recently, Hwang et al. proposed a new (t, n) threshold proxy signature scheme based on the RSA cryptosystem. In this paper, we show that their scheme is insecure against the original signer’s forgery and the general forgery.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Standards & Interfaces

دوره 31  شماره 

صفحات  -

تاریخ انتشار 2009