Improvement of Li et al.'s proxy signature scheme

被引:0
|
作者
Dept. of Electrical and Computer Eng., Kangwon National University, Chuncheon, Korea, Republic of [1 ]
不详 [2 ]
机构
来源
WSEAS Trans. Syst | 2006年 / 1卷 / 305-311期
关键词
Cryptography - Mathematical models - Mobile telecommunication systems - Probability - Random processes - Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
Li et al. proposed a modification to the Park and Lee's nominative proxy signature scheme for mobile communication such that the original signer enables a proxy signer to nominate the verifier. However, this paper shows that this modification is still vulnerable to the original signer's forgery attack, which is contrary to their claims. Additionally, we propose an enhanced scheme to overcome the fundamental security flaw and prove that it is secure in the random oracle model.
引用
收藏
相关论文
共 50 条
  • [1] Improvement on Li et al.'s generalization of proxy signature schemes
    Hwang, SJ
    Chan, CC
    [J]. COMPUTERS & SECURITY, 2004, 23 (07) : 615 - 619
  • [2] Improvement of Yang et al.'s threshold proxy signature scheme
    Shao, Jun
    Cao, Zhenfu
    Lu, Rongxing
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) : 172 - 177
  • [3] Improvement on Huang et al.'s Novel Efficient Threshold Proxy Signature Scheme
    Hu, Jiang-hong
    Huang, Mei-juan
    Zhang, Jian-zhong
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 116 - 119
  • [4] Security analysis and improvement of hsu et al.'s threshold proxy signature scheme
    Institute of Systems Science, Academy of Mathematics and System Sciences, Chinese Academy of Sciences, Graduate School of Chinese Academy of Sciences, Beijing 100080, China
    不详
    不详
    不详
    [J]. Int. J. Netw. Secur, 2006, 1 (69-72):
  • [5] Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers
    Xie, Q
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 776 - 782
  • [6] Cryptanalysis and improvement on Chang et al.'s signature scheme
    Wang, Qing-Long
    Han, Zhen
    Geng, Xiu-Hua
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 112 - 114
  • [7] Security of Lu et al.'s proxy-protected signature scheme
    Park, JH
    Kang, BG
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1010 - 1015
  • [8] Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Bao, HY
    Cao, ZF
    Wang, SB
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1419 - 1430
  • [9] Improvement on Hwang et al.'s generalization of proxy signature schemes based on elliptic curves
    Hwang, SJ
    Huang, CW
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 941 - 947
  • [10] Comment on Lee J-s et al.'s identity-based designated verifer proxy signature scheme and its improvement
    Liao Da-jian
    Tang Yuan-sheng
    [J]. SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 753 - +