An improved designated-verifier proxy signature scheme

被引:0
|
作者
Zhang, Jianhong [1 ]
机构
[1] N China Univ Technol, Coll Sci, Beijing 100041, Peoples R China
关键词
digital signature; designated-verifier proxy signature; security analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a special signature, proxy signature allows a entity called original signer to delegate his signing capability to another entity to produce signature on behalf of him. By combining the ideas of proxy signatures and designated-verifier signatures, G:L.Wang et.al. proposed a strong designated-verifier proxy signature scheme (for short DVP) and claimed that the security of their scheme was based on the computational Diffie-Hellman assumption. Unfortunately, in the paper, we give security analysis of Wang et.al's strong designated-verifier proxy signature scheme and show that their scheme is forgeable. Namely, an adversary can forge a DVP signature on arbitrary message m without the knowledge of the proxy secret key xp or the designated verifier's secret key x(C). At the same time, we give two attacks on the Strong designated-verifier proxy signature scheme. Finally, we give an improved scheme to overcome the above forgery attacks, and show the scheme to be secure in random oracle model.
引用
收藏
页码:77 / 82
页数:6
相关论文
共 50 条
  • [41] Short designated verifier proxy signature from pairings
    Huang, XY
    Mu, Y
    Susilo, W
    Zhang, FT
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 835 - 844
  • [42] A short and highly efficient identity-based designated verifier proxy signature scheme
    Hu, Xiaoming
    Wang, Jian
    Xu, Huajie
    Tan, Wenan
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 907 - 916
  • [43] Bandwidth efficient designated verifier proxy signature scheme for healthcare wireless sensor networks
    Verma, Girraj Kumar
    Singh, B. B.
    Singh, Harendra
    AD HOC NETWORKS, 2018, 81 : 100 - 108
  • [44] Pairing-based strong designated verifier proxy signature scheme with low cost
    Hsu, Chien-Lung
    Lin, Han-Yu
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 517 - 522
  • [45] A Tight Security Reduction Designated Verifier Proxy Signature Scheme Without Random Oracle
    Hu, Xiaoming
    Lu, Hong
    Liu, Yan
    Wang, Jian
    Tan, Wenan
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT I, 2015, 9155 : 98 - 109
  • [46] Provable Secure ID Based Designated Verifier Proxy Signature Scheme without Pairings
    Tiwari, Namita
    Padhye, Sahadeo
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (03): : 199 - 212
  • [47] Designated-Verifier Linkable Ring Signatures
    Behrouz, Pourandokht
    Grontas, Panagiotis
    Konstantakatos, Vangelis
    Pagourtzis, Aris
    Spyrakou, Marianna
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 51 - 70
  • [48] Designated-Verifier Pseudorandom Generators, and Their Applications
    Couteau, Geoffroy
    Hofheinz, Dennis
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II, 2019, 11477 : 562 - 592
  • [49] Strong designated verifier ring signature scheme
    Lee, Ji-Seon
    Chang, Jik Hyun
    INNOVATIONS AND ADVANCED TECHNIQUES IN COMPUTER AND INFORMATION SCIENCES AND ENGINEERING, 2007, : 543 - 547
  • [50] A Real Quantum Designated Verifier Signature Scheme
    Shi, Wei-Min
    Zhou, Yi-Hua
    Yang, Yu-Guang
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2015, 54 (09) : 3115 - 3123