Improvement of Li et al.'s proxy signature scheme

被引:0
|
作者
Dept. of Electrical and Computer Eng., Kangwon National University, Chuncheon, Korea, Republic of [1 ]
不详 [2 ]
机构
来源
WSEAS Trans. Syst. | 2006年 / 1卷 / 305-311期
关键词
Cryptography - Mathematical models - Mobile telecommunication systems - Probability - Random processes - Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
Li et al. proposed a modification to the Park and Lee's nominative proxy signature scheme for mobile communication such that the original signer enables a proxy signer to nominate the verifier. However, this paper shows that this modification is still vulnerable to the original signer's forgery attack, which is contrary to their claims. Additionally, we propose an enhanced scheme to overcome the fundamental security flaw and prove that it is secure in the random oracle model.
引用
收藏
相关论文
共 50 条
  • [21] Security analysis of choi et al.'s certificateless short signature scheme
    Chen, Yu-Chi
    Tso, Raylin
    Horng, Gwoboa
    [J]. Journal of Information Hiding and Multimedia Signal Processing, 2013, 4 (03): : 147 - 154
  • [22] Comments on the security flaw of hwang et al.'s blind signature scheme
    Department of Accounting and Information, The Overseas Chinese Institute of Technology, Taiwan
    不详
    不详
    [J]. Int. J. Netw. Secur., 2008, 2 (185-189):
  • [23] Comment on Saeednia et al.'s strong designated verifier signature scheme
    Lee, Ji-Seon
    Chang, Jik Hyun
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 258 - 260
  • [24] Improvement of a threshold proxy signature scheme
    Li, Ji-Guo
    Cao, Zhen-Fu
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (11):
  • [25] Improvement of threshold proxy signature scheme
    Hsu, CL
    Wu, TS
    Wu, TC
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2003, 136 (2-3) : 315 - 321
  • [26] Improvement of threshold proxy signature scheme
    Shao, ZH
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) : 53 - 59
  • [27] Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes
    Wu, LC
    Yeh, YS
    Liu, TS
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (02) : 176 - 179
  • [28] Improvement of a threshold proxy signature scheme
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3168 - 3172
  • [29] Improvement of threshold proxy signature scheme
    Hsu, Chien-Lung
    Wu, Tzong-Sun
    Wu, Tzong-Chen
    [J]. Applied Mathematics and Computation (New York), 2003, 136 (2-3): : 315 - 321
  • [30] Improvement of a new proxy signature scheme
    Guo, Gang
    Zeng, Guo-Ping
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2008, 30 (01): : 245 - 248