Repudiation of cheating and non-repudiation of Zhang's proxy signature schemes

被引:0
|
作者
Ghodosi, H [1 ]
Pieprzyk, J [1 ]
机构
[1] Univ Wollongong, Sch Informat Technol & Comp Sci, Ctr Comp Secur Res, Wollongong, NSW 2522, Australia
来源
关键词
cryptography; digital signatures; proxy signatures; ElGamal signatures;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The paper discusses the correctness of Lee, Hwang and Wang's comments on on Zhang's proxy signature schemes. In particular, it is shown that the cheating attack proposed by Lee, Hwang and Wang can be detected by the owner of the signature scheme. It is argued that considering the context in which proxy signatures are used, the attack is not a security problem. The work is concluded by a discussion about the non-repudiation controversy incorrectly observed by Lee, Hwang and Wang.
引用
收藏
页码:129 / 134
页数:6
相关论文
共 50 条
  • [21] A mutual non-repudiation protocol with privacy
    Jiang Xiao-ning
    Ye Cheng-qing
    [J]. Journal of Zhejiang University-SCIENCE A, 2000, 1 (3): : 317 - 321
  • [22] Automatic Analysis of a Non-Repudiation Protocol
    Lanotte, Ruggero
    Maggiolo-Schettini, Andrea
    Troina, Angelo
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 113 - 129
  • [23] Anonymous fingerprinting with direct non-repudiation
    Pfitzmann, B
    Sadeghi, AR
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 401 - 414
  • [24] Some guidelines for non-repudiation protocols
    Louridas, P
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2000, 30 (05) : 29 - 38
  • [25] Non-repudiation protocols for multiple entities
    Onieva, JA
    Zhou, JY
    Lopez, J
    [J]. COMPUTER COMMUNICATIONS, 2004, 27 (16) : 1608 - 1616
  • [26] Optimistic non-repudiation protocol analysis
    Santiago, Judson
    Vigneron, Laurent
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 90 - +
  • [27] Signcryption with Non-interactive Non-repudiation
    John Malone-Lee
    [J]. Designs, Codes and Cryptography, 2005, 37 : 81 - 109
  • [28] A formal analysis of CORBA non-repudiation
    Zheng, H
    Song, GX
    [J]. International Conference on Computing, Communications and Control Technologies, Vol 6, Post-Conference Issue, Proceedings, 2004, : 401 - 405
  • [29] On the security of fair non-repudiation protocols
    Gürgens S.
    Rudolph C.
    Vogt H.
    [J]. International Journal of Information Security, 2005, 4 (4) : 253 - 262
  • [30] Improvement of a fair non-repudiation protocol
    Wen, Jinghua
    Liang, Min
    Yang, Zirong
    Li, Xiang
    [J]. PROCEEDINGS OF E-ENGDET2006, 2006, : 70 - 74