Repudiation of cheating and non-repudiation of Zhang's proxy signature schemes

被引:0
|
作者
Ghodosi, H [1 ]
Pieprzyk, J [1 ]
机构
[1] Univ Wollongong, Sch Informat Technol & Comp Sci, Ctr Comp Secur Res, Wollongong, NSW 2522, Australia
来源
关键词
cryptography; digital signatures; proxy signatures; ElGamal signatures;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The paper discusses the correctness of Lee, Hwang and Wang's comments on on Zhang's proxy signature schemes. In particular, it is shown that the cheating attack proposed by Lee, Hwang and Wang can be detected by the owner of the signature scheme. It is argued that considering the context in which proxy signatures are used, the attack is not a security problem. The work is concluded by a discussion about the non-repudiation controversy incorrectly observed by Lee, Hwang and Wang.
引用
收藏
页码:129 / 134
页数:6
相关论文
共 50 条
  • [1] A Signature Scheme with Non-Repudiation
    XIN Xiangjun~ 1
    2.Department of Information and Computing Science
    [J]. Wuhan University Journal of Natural Sciences, 2006, (05) : 1249 - 1252
  • [2] Evidence and non-repudiation
    Zhou, JY
    Gollmann, D
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 1997, 20 (03) : 267 - 281
  • [3] A proof of non-repudiation
    Bella, G
    Paulson, LC
    [J]. SECURITY PROTOCOLS, 2002, 2467 : 119 - 125
  • [4] Efficient non-repudiation multicast source authentication schemes
    Li, XX
    Huai, JP
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2002, 17 (06): : 820 - 829
  • [5] Efficient non-repudiation multicast source authentication schemes
    Xianxian Li
    Jinpeng Huai
    [J]. Journal of Computer Science and Technology, 2002, 17 : 820 - 829
  • [6] SM9 Digital Signature with Non-repudiation
    Wang, Meng
    Long, Yihong
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2020), 2020, : 356 - 361
  • [7] An efficient non-repudiation protocol
    Zhou, JY
    Gollmann, D
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 126 - 132
  • [8] A fair non-repudiation protocol
    Meng, B
    Wang, SM
    Xiong, QX
    [J]. PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON CSCW IN DESIGN, 2002, : 68 - 73
  • [9] Non-repudiation Analysis with LYSA
    Bruso, Mayla
    Cortesi, Agostino
    [J]. EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST, 2009, 297 : 318 - 329
  • [10] Achieving non-repudiation of receipt
    Zhang, N
    Shi, Q
    [J]. COMPUTER JOURNAL, 1996, 39 (10): : 844 - 853