Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes

被引:3
|
作者
Wu, LC [1 ]
Yeh, YS
Liu, TS
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 300, Taiwan
[2] Chunghwa Telecom Co Ltd, Telecommun Labs, Taoyuan 326, Taiwan
关键词
unlinkability; blind signature; proxy signature; digital signature; cryptography;
D O I
10.1016/j.jss.2005.05.007
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The proxy blind signature scheme allows the designated proxy signer using the proxy secret key to generate a blind signature on behalf of the original signer. Tan et al. presented the DLP-based and ECDLP based blind signature schemes. Awasthi and Lal proposed a improved DLP-based scheme later. Recently, Sun et al. presented linkability attack on Tan et al.'s and Awasthi-Lal's proxy blind signature schemes respectively. In this paper, we show that Sun et al.'s attack is failed and these schemes are still satisfy the unlinkability property. (C) 2005 Elsevier Inc. All rights reserved.
引用
收藏
页码:176 / 179
页数:4
相关论文
共 50 条
  • [1] Linkability analysis of some blind signature schemes
    Zhang, Jianhong
    Mao, Jian
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 556 - 566
  • [2] Linkability analysis of some blind signature schemes
    Zhang, Jianhong
    [J]. 2006 International Conference on Computational Intelligence and Security, Pts 1 and 2, Proceedings, 2006, : 1367 - 1370
  • [3] Linkability of some blind signature schemes
    Heng, Swee-Huay
    Yap, Wun-She
    Khoo, Khoongming
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 80 - +
  • [4] Improvement on Li et al.'s generalization of proxy signature schemes
    Hwang, SJ
    Chan, CC
    [J]. COMPUTERS & SECURITY, 2004, 23 (07) : 615 - 619
  • [5] Cryptanalysis of Zhou et al.'s proxy-protected signature schemes
    Park, JH
    Kang, BG
    Han, JW
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 192 - 197
  • [6] Improvement on Hwang et al.'s generalization of proxy signature schemes based on elliptic curves
    Hwang, SJ
    Huang, CW
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 941 - 947
  • [7] On the security of some proxy blind signature schemes
    Sun, HM
    Hsieh, BT
    Tseng, SM
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 74 (03) : 297 - 302
  • [8] Analysis on traceability on Stadler et al.'s fair blind signature
    Lee, NY
    Sun, MK
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (11) : 2901 - 2902
  • [9] On the proxy-protected property of Chen et al.'s proxy multisignature schemes
    Huang, Pei-Hui
    Wen, Hsiang-An
    Wang, Chih-Hung
    Hwang, Tzonelih
    [J]. INFORMATICA, 2007, 18 (01) : 55 - 60
  • [10] Improvement of Yang et al.'s threshold proxy signature scheme
    Shao, Jun
    Cao, Zhenfu
    Lu, Rongxing
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) : 172 - 177