Attacks on One Designated Verifier Proxy Signature Scheme

被引:1
|
作者
Kang, Baoyuan [1 ]
机构
[1] Tianjin Polytech Univ, Comp Sci & Software Inst, Tianjin 300387, Peoples R China
关键词
D O I
10.1155/2012/508981
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the original signer. But only the designated verifier can verify the proxy signature. Several designated verifier proxy signature schemes have been proposed. However, most of them were proven secure in the random oracle model, which has received a lot of criticism since the security proofs in the random oracle model are not sound with respect to the standard model. Recently, by employing Water's hashing technique, Yu et al. proposed a new construction of designated verifier proxy signature. They claimed that the new construction is the first designated verifier proxy signature, whose security does not rely on the random oracles. But, in this paper, we will show some attacks on Yu et al.'s scheme. So, their scheme is not secure.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Designated verifier proxy signature scheme
    Liao, Yongjian
    Lu, Qing
    Qin, Zhiguang
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 235 - 238
  • [2] Attacks on a Universal Designated Verifier Signature Scheme
    Li Yanping
    Pang Liaojun
    Wang Yumin
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 27 - +
  • [3] Designated verifier proxy signature scheme with message recovery
    Lu, RX
    Cao, ZF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1237 - 1246
  • [4] A Strong Designated-verifier Proxy Signature scheme
    Zhang, Bo
    Xu, Qiuliang
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 569 - 572
  • [5] An improved designated-verifier proxy signature scheme
    Zhang, Jianhong
    INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, PROCEEDINGS, 2007, : 77 - 82
  • [6] New Certificateless Designated-verifier Proxy Signature Scheme
    Liu Yun-fang
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 585 - 588
  • [7] Short and provably secure designated verifier proxy signature scheme
    Hu, Xiaoming
    Tan, Wenan
    Xu, Huajie
    Wang, Jian
    IET INFORMATION SECURITY, 2016, 10 (02) : 69 - 79
  • [8] Designated verifier proxy signature scheme from bilinear pairings
    Lu, Rongxing
    Cao, Zhenfu
    Dong, Xiaolei
    Su, Renwang
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 40 - +
  • [9] Designated verifier proxy signature scheme without random oracles
    Yu, Yong
    Xu, Chunxiang
    Zhang, Xiaosong
    Liao, Yongjian
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2009, 57 (08) : 1352 - 1364
  • [10] ID-based designated multi verifier proxy signature scheme
    Tang, Zhao-Xia
    Xu, Qiu-Liang
    Zhu, Jian-Dong
    Tongxin Xuebao/Journal on Communication, 2008, 29 (SUPPL.): : 41 - 45