An improved designated-verifier proxy signature scheme

被引:0
|
作者
Zhang, Jianhong [1 ]
机构
[1] N China Univ Technol, Coll Sci, Beijing 100041, Peoples R China
关键词
digital signature; designated-verifier proxy signature; security analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a special signature, proxy signature allows a entity called original signer to delegate his signing capability to another entity to produce signature on behalf of him. By combining the ideas of proxy signatures and designated-verifier signatures, G:L.Wang et.al. proposed a strong designated-verifier proxy signature scheme (for short DVP) and claimed that the security of their scheme was based on the computational Diffie-Hellman assumption. Unfortunately, in the paper, we give security analysis of Wang et.al's strong designated-verifier proxy signature scheme and show that their scheme is forgeable. Namely, an adversary can forge a DVP signature on arbitrary message m without the knowledge of the proxy secret key xp or the designated verifier's secret key x(C). At the same time, we give two attacks on the Strong designated-verifier proxy signature scheme. Finally, we give an improved scheme to overcome the above forgery attacks, and show the scheme to be secure in random oracle model.
引用
收藏
页码:77 / 82
页数:6
相关论文
共 50 条
  • [21] Designated verifier proxy signature scheme from bilinear pairings
    Lu, Rongxing
    Cao, Zhenfu
    Dong, Xiaolei
    Su, Renwang
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 40 - +
  • [22] Designated verifier proxy signature scheme without random oracles
    Yu, Yong
    Xu, Chunxiang
    Zhang, Xiaosong
    Liao, Yongjian
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2009, 57 (08) : 1352 - 1364
  • [23] RETRACTED: Identity-Based Designated-Verifier Proxy Signature Scheme with Information Recovery in Telemedicine System (Retracted Article)
    Zhou, Yuping
    Hu, Yu
    Chen, Jianneng
    Huang, Zengjie
    Huang, Hui
    Zhang, Yi Fan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [24] ID-based designated multi verifier proxy signature scheme
    Tang, Zhao-Xia
    Xu, Qiu-Liang
    Zhu, Jian-Dong
    Tongxin Xuebao/Journal on Communication, 2008, 29 (SUPPL.): : 41 - 45
  • [25] An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce
    Lin, Han-Yu
    Wu, Tzong-Sun
    Huang, Shih-Kun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2012, 28 (04) : 771 - 785
  • [26] PROXY BLIND SIGNATURE SCHEME FOR ID-BASED DESIGNATED VERIFIER
    Zhang, Xiaozhi
    Xi, Junfu
    Wang, Zhengqiang
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 376 - 379
  • [28] Efficient Strong Designated Verifier Proxy Signature Scheme with Low Cost
    Liu, Yan
    Hu, Xiaoming
    Zhang, Xiaojun
    Wang, Jian
    Yang, Yinchun
    2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 568 - 572
  • [29] Universal designated-verifier proxy blind signatures for E-commerce
    Cao, TJ
    Lin, DD
    Xue, R
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 1036 - 1041
  • [30] A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments
    Yang, Xiao-Dong
    Xiao, Li-Kun
    Chen, Chun-Lin
    Wang, Cai-Fen
    SYMMETRY-BASEL, 2018, 10 (11):