An improved designated-verifier proxy signature scheme

被引:0
|
作者
Zhang, Jianhong [1 ]
机构
[1] N China Univ Technol, Coll Sci, Beijing 100041, Peoples R China
关键词
digital signature; designated-verifier proxy signature; security analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a special signature, proxy signature allows a entity called original signer to delegate his signing capability to another entity to produce signature on behalf of him. By combining the ideas of proxy signatures and designated-verifier signatures, G:L.Wang et.al. proposed a strong designated-verifier proxy signature scheme (for short DVP) and claimed that the security of their scheme was based on the computational Diffie-Hellman assumption. Unfortunately, in the paper, we give security analysis of Wang et.al's strong designated-verifier proxy signature scheme and show that their scheme is forgeable. Namely, an adversary can forge a DVP signature on arbitrary message m without the knowledge of the proxy secret key xp or the designated verifier's secret key x(C). At the same time, we give two attacks on the Strong designated-verifier proxy signature scheme. Finally, we give an improved scheme to overcome the above forgery attacks, and show the scheme to be secure in random oracle model.
引用
收藏
页码:77 / 82
页数:6
相关论文
共 50 条
  • [1] A Strong Designated-verifier Proxy Signature scheme
    Zhang, Bo
    Xu, Qiuliang
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 569 - 572
  • [2] On the Security of a Designated-Verifier Proxy Signature Scheme and Its Improved Scheme (revisited)
    Zhang, Jianhong
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2196 - 2199
  • [3] New Certificateless Designated-verifier Proxy Signature Scheme
    Liu Yun-fang
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 585 - 588
  • [4] Designated-verifier chameleon proxy signature
    Zhang, Jianhong
    Ji, Cheng
    Geng, Qin
    INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 554 - 561
  • [5] Designated-verifier proxy signature schemes
    Wang, GL
    Security and Privacy in the Age of Ubiquitous Computing, 2005, 181 : 409 - 423
  • [6] Designated-Verifier Chameleon Proxy Signature
    Zhang, Jianhong
    Ji, Cheng
    Geng, Qin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01): : 29 - 29
  • [7] Designated-verifier proxy signature schemes
    Wang, Guilin (glwang@iZr.a-star.edtsg), 1600, (Springer Science and Business Media, LLC):
  • [8] Cryptanalysis and Improvement of a Strong Designated-verifier Proxy Signature scheme
    Yang, Liguo
    Ou, Funa
    Zhao, Jing
    ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY III, PTS 1-4, 2013, 397-400 : 1999 - 2003
  • [9] An ID-Based Designated-Verifier Proxy Multi-Signature Scheme
    Zuo, Weiping
    Liu, Yunfang
    Wang, Sanfu
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 576 - 579
  • [10] Designated verifier proxy signature scheme
    Liao, Yongjian
    Lu, Qing
    Qin, Zhiguang
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 235 - 238