Improvement on Hwang et al.'s generalization of proxy signature schemes based on elliptic curves

被引:1
|
作者
Hwang, SJ [1 ]
Huang, CW [1 ]
机构
[1] Tamkang Univ, Dept Comp Sci & Informat Engn, Tamsui 251, Taipei Hsien, Taiwan
关键词
proxy signature schemes; proxy threshold signature schemes; multi-proxy signature schemes; proxy multi-signature schemes; multi-proxy multi-signature schemes; digital signature schemes; elliptic curve cryptography;
D O I
10.1016/j.amc.2004.12.036
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Hwang et al. proposed their generalization of proxy signature schemes based on elliptic Curves. However, two attacks are proposed to show that their schemes have serious security flaws. By the first attack, an adversary can forge an illegal proxy Signature that verifiers cannot actually find out the original signers of proxy signatures. The second attack is used to change proxy signatures into multi-signatures belonging to the group that actually generates the proxy signatures. To overcome these flaws, our improvement on Hwang et al.'s scheme is also proposed. (c) 2005 Elsevier Inc. All rights reserved.
引用
收藏
页码:941 / 947
页数:7
相关论文
共 50 条
  • [21] Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Bao, HY
    Cao, ZF
    Wang, SB
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1419 - 1430
  • [22] Comment on Wu et al.'s Server-aided Verification Signature Schemes
    Wang, Zhiwei
    Wang, Licheng
    Yang, Yixian
    Hu, Zhengming
    [J]. International Journal of Network Security, 2010, 10 (03) : 238 - 240
  • [23] Fail-stop threshold signature schemes based on elliptic curves
    Susilo, W
    Safavi-Naini, R
    Pieprzyk, J
    [J]. INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 103 - 116
  • [24] Improvement on Lin et al's Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce
    Zhou, Caixue
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 333 - 347
  • [25] Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem
    Li, Fengying
    Xue, Qingshui
    [J]. 2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, : 423 - 426
  • [26] Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem
    Li, Fengying
    Xue, Qingshui
    [J]. COMPUTING AND INTELLIGENT SYSTEMS, PT IV, 2011, 234 : 101 - +
  • [27] Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Gopalakrishnan, Ragavendran
    Karuturi, Naga Naresh
    Rangan, C. Pandu
    [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 115 - 129
  • [28] On the security of Yuan et al.'s undeniable signature scheme
    Zhao, Wei
    [J]. International Journal of Network Security, 2010, 11 (03) : 177 - 180
  • [29] Cryptanalysis of Tseng et al.'s authenticated encryption schemes
    Qi, X
    Xiu, YY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2004, 158 (01) : 1 - 5
  • [30] Improvement of Hsu-Wu-He's proxy multi-signature schemes
    Yuan, YM
    [J]. SECURE DATA MANAGEMENT, PROCEEDINGS, 2005, 3674 : 234 - 240