Attacks on One Designated Verifier Proxy Signature Scheme

被引:1
|
作者
Kang, Baoyuan [1 ]
机构
[1] Tianjin Polytech Univ, Comp Sci & Software Inst, Tianjin 300387, Peoples R China
关键词
D O I
10.1155/2012/508981
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the original signer. But only the designated verifier can verify the proxy signature. Several designated verifier proxy signature schemes have been proposed. However, most of them were proven secure in the random oracle model, which has received a lot of criticism since the security proofs in the random oracle model are not sound with respect to the standard model. Recently, by employing Water's hashing technique, Yu et al. proposed a new construction of designated verifier proxy signature. They claimed that the new construction is the first designated verifier proxy signature, whose security does not rely on the random oracles. But, in this paper, we will show some attacks on Yu et al.'s scheme. So, their scheme is not secure.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Bandwidth efficient designated verifier proxy signature scheme for healthcare wireless sensor networks
    Verma, Girraj Kumar
    Singh, B. B.
    Singh, Harendra
    AD HOC NETWORKS, 2018, 81 : 100 - 108
  • [32] An ID-Based Designated-Verifier Proxy Multi-Signature Scheme
    Zuo, Weiping
    Liu, Yunfang
    Wang, Sanfu
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 576 - 579
  • [33] Pairing-based strong designated verifier proxy signature scheme with low cost
    Hsu, Chien-Lung
    Lin, Han-Yu
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 517 - 522
  • [34] A Tight Security Reduction Designated Verifier Proxy Signature Scheme Without Random Oracle
    Hu, Xiaoming
    Lu, Hong
    Liu, Yan
    Wang, Jian
    Tan, Wenan
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT I, 2015, 9155 : 98 - 109
  • [35] Provable Secure ID Based Designated Verifier Proxy Signature Scheme without Pairings
    Tiwari, Namita
    Padhye, Sahadeo
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (03): : 199 - 212
  • [36] Strong designated verifier ring signature scheme
    Lee, Ji-Seon
    Chang, Jik Hyun
    INNOVATIONS AND ADVANCED TECHNIQUES IN COMPUTER AND INFORMATION SCIENCES AND ENGINEERING, 2007, : 543 - 547
  • [37] A Real Quantum Designated Verifier Signature Scheme
    Shi, Wei-Min
    Zhou, Yi-Hua
    Yang, Yu-Guang
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2015, 54 (09) : 3115 - 3123
  • [38] An efficient strong designated verifier signature scheme
    Saeednia, S
    Kremer, S
    Markowitch, O
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 40 - 54
  • [39] A Real Quantum Designated Verifier Signature Scheme
    Wei-Min Shi
    Yi-Hua Zhou
    Yu-Guang Yang
    International Journal of Theoretical Physics, 2015, 54 : 3115 - 3123
  • [40] Certificateless Strong Designated Verifier Signature Scheme
    Xiao, Zibi
    Yang, Bo
    Li, Shougui
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 232 - 236