Attack and Improvement of a Proxy Multi-Signature Scheme

被引:0
|
作者
Wei Hong-ru [1 ]
Hu Jia-yuan [1 ]
机构
[1] Univ Sci & Technol Beijing, Sch Math & Phys, Beijing 100083, Peoples R China
关键词
digital signature; proxy signature; proxy multi-signature; forgery attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Proxy multi-signature system is based on digital signature scheme for a class of special signature scheme, which requires the signer to own certain powers were delegated to each proxy signer to make these proxy signer to use these powers on behalf of himself. In this paper, a class before the enhanced proxy multi-signature scheme carry out the attack and improvement, three forgery attacks has been implemented, one for the any original signer, one for the any proxy signer, and one for the proxy signer modify the proxy deadline. While the original proposals put forward an improved model, to prevent a proxy signer rights transfer, the ability to prevent abuse of the signature to ensure that the proxy signature security.
引用
收藏
页码:60 / 63
页数:4
相关论文
共 50 条
  • [41] Strongly unforgeable threshold multi-proxy multi-signature scheme with different proxy groups
    Liu, D.
    Wang, X.
    Huang, M.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3693 - 3705
  • [42] ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
    Li, XG
    Chen, KF
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 437 - 450
  • [43] Analysis of an ID-based Proxy Signature Scheme Without Trusted PKG and a Proxy Blind Multi-signature Scheme
    Sha, Limin
    [J]. 2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 167 - 170
  • [44] An efficient ID-based multi-proxy multi-signature scheme
    Guo, Sheng
    Cao, Zhenfu
    Lu, Rongxing
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 81 - +
  • [45] A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Tzeng, SF
    Yang, CY
    Hwang, MS
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2004, 20 (05): : 887 - 893
  • [46] An Anonymous Proxy Multi-signature with Accountablility
    Saraswat, Vishal
    Sahu, Rajeev Anand
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 234 - 254
  • [47] Improvement of multi-proxy signature scheme
    Xue, QS
    Cao, ZF
    [J]. FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, : 450 - 455
  • [48] Identity based proxy multi-signature
    Wang, Qin
    Cao, Zhenfu
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (07) : 1023 - 1029
  • [49] A new multi-proxy multi-signature scheme based on elliptic curve cryptography
    Dang Minh Tuan
    Nguyen Anh Viet
    [J]. 2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2017, : 105 - 109
  • [50] A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Kang, Baoyuan
    Boyd, Colin
    Dawson, Ed
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 9 - 17