Attacks on One Designated Verifier Proxy Signature Scheme

被引:1
|
作者
Kang, Baoyuan [1 ]
机构
[1] Tianjin Polytech Univ, Comp Sci & Software Inst, Tianjin 300387, Peoples R China
关键词
D O I
10.1155/2012/508981
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the original signer. But only the designated verifier can verify the proxy signature. Several designated verifier proxy signature schemes have been proposed. However, most of them were proven secure in the random oracle model, which has received a lot of criticism since the security proofs in the random oracle model are not sound with respect to the standard model. Recently, by employing Water's hashing technique, Yu et al. proposed a new construction of designated verifier proxy signature. They claimed that the new construction is the first designated verifier proxy signature, whose security does not rely on the random oracles. But, in this paper, we will show some attacks on Yu et al.'s scheme. So, their scheme is not secure.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments
    Yang, Xiao-Dong
    Xiao, Li-Kun
    Chen, Chun-Lin
    Wang, Cai-Fen
    SYMMETRY-BASEL, 2018, 10 (11):
  • [22] Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks
    Lei He
    Jianfeng Ma
    Limin Shen
    Dawei Wei
    Science China Information Sciences, 2021, 64
  • [23] Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks
    Lei HE
    Jianfeng MA
    Limin SHEN
    Dawei WEI
    Science China(Information Sciences), 2021, 64 (01) : 79 - 93
  • [24] A Designated Verifier Proxy Signature Scheme with Fast Revocation without Random Oracles
    Beheshti-Atashgah, M.
    Gardeshi, M.
    Bayat, M.
    DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS, PT I, 2011, 166 : 535 - +
  • [25] Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks
    He, Lei
    Ma, Jianfeng
    Shen, Limin
    Wei, Dawei
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (01)
  • [26] An Obfuscatable Designated Verifier Signature Scheme
    Shi, Yang
    Fan, Hongfei
    Liu, Qin
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (02) : 271 - 285
  • [27] On the security of group signature scheme and designated verifier signature scheme
    Zhang, Jianhong
    Geng, Qin
    PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 351 - 358
  • [28] A New Designated Verifier Proxy Signature in Standard Model
    Guo, Li-Hong
    Wu, Hai-Tao
    Yang, Qing
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 148 - 151
  • [29] Short designated verifier proxy signature from pairings
    Huang, XY
    Mu, Y
    Susilo, W
    Zhang, FT
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 835 - 844
  • [30] A short and highly efficient identity-based designated verifier proxy signature scheme
    Hu, Xiaoming
    Wang, Jian
    Xu, Huajie
    Tan, Wenan
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 907 - 916