Improvement on Hwang et al.'s generalization of proxy signature schemes based on elliptic curves

被引:1
|
作者
Hwang, SJ [1 ]
Huang, CW [1 ]
机构
[1] Tamkang Univ, Dept Comp Sci & Informat Engn, Tamsui 251, Taipei Hsien, Taiwan
关键词
proxy signature schemes; proxy threshold signature schemes; multi-proxy signature schemes; proxy multi-signature schemes; multi-proxy multi-signature schemes; digital signature schemes; elliptic curve cryptography;
D O I
10.1016/j.amc.2004.12.036
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Hwang et al. proposed their generalization of proxy signature schemes based on elliptic Curves. However, two attacks are proposed to show that their schemes have serious security flaws. By the first attack, an adversary can forge an illegal proxy Signature that verifiers cannot actually find out the original signers of proxy signatures. The second attack is used to change proxy signatures into multi-signatures belonging to the group that actually generates the proxy signatures. To overcome these flaws, our improvement on Hwang et al.'s scheme is also proposed. (c) 2005 Elsevier Inc. All rights reserved.
引用
收藏
页码:941 / 947
页数:7
相关论文
共 50 条
  • [1] Improvement on Li et al.'s generalization of proxy signature schemes
    Hwang, SJ
    Chan, CC
    [J]. COMPUTERS & SECURITY, 2004, 23 (07) : 615 - 619
  • [2] Generalization of proxy signature based on elliptic curves
    Hwang, MS
    Tzeng, SF
    Tsai, CS
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 26 (02) : 73 - 84
  • [3] Improvement of Yang et al.'s threshold proxy signature scheme
    Shao, Jun
    Cao, Zhenfu
    Lu, Rongxing
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) : 172 - 177
  • [4] Cryptanalysis of Zhou et al.'s proxy-protected signature schemes
    Park, JH
    Kang, BG
    Han, JW
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 192 - 197
  • [5] Improvement on a generalized scheme of proxy signature based on elliptic curves
    Tan, Zuowen
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 677 - 681
  • [6] Improvement on Huang et al.'s Novel Efficient Threshold Proxy Signature Scheme
    Hu, Jiang-hong
    Huang, Mei-juan
    Zhang, Jian-zhong
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 116 - 119
  • [7] Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes
    Wu, LC
    Yeh, YS
    Liu, TS
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (02) : 176 - 179
  • [8] Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers
    Xie, Q
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 776 - 782
  • [9] On the proxy-protected property of Chen et al.'s proxy multisignature schemes
    Huang, Pei-Hui
    Wen, Hsiang-An
    Wang, Chih-Hung
    Hwang, Tzonelih
    [J]. INFORMATICA, 2007, 18 (01) : 55 - 60
  • [10] Cryptanalysis and improvement on Chang et al.'s signature scheme
    Wang, Qing-Long
    Han, Zhen
    Geng, Xiu-Hua
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 112 - 114