Cryptanalysis of ID based Proxy-Blind signature scheme over lattice

被引:8
|
作者
Rawal, Swati [1 ]
Padhye, Sahadeo [1 ]
机构
[1] Motilal Nehru Natl Inst Technol, Dept Math, Allahabad 211004, Uttar Pradesh, India
来源
ICT EXPRESS | 2020年 / 6卷 / 01期
关键词
Lattice cryptography; Cryptanalysis; Proxy signature; Blind signature;
D O I
10.1016/j.icte.2019.05.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article we review the ID Based Proxy-Blind signature scheme proposed by Zhang et al. and we give an attack on the scheme revealing the master secret key used in the construction of their scheme. (C) 2020 The Korean Institute of Communications and Information Sciences (KICS). Publishing services by Elsevier B.V.
引用
收藏
页码:20 / 22
页数:3
相关论文
共 50 条
  • [21] The Design of ID-based Fair Proxy Blind Signature Scheme with Weak Linkability
    Wang, Chih Hung
    Fan, Jia-Yu
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND INTELLIGENT CONTROL (ISIC 2012), 2012, : 168 - 173
  • [22] Cryptanalysis of Lattice-Based Blind Signature and Blind Ring Signature Schemes
    Shim, Kyung-Ah
    An, Youngjoo
    IEEE ACCESS, 2021, 9 : 134427 - 134434
  • [23] A short ID-based proxy signature scheme
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (05) : 859 - 873
  • [24] Cryptanalysis of an identity based proxy multi-signature scheme
    Li, Fagen
    Zhou, Shijie
    Sun, Rong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1820 - 1823
  • [25] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205
  • [26] A proxy blind signature scheme based on ECDLP
    Wang, H
    Wang, R
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (02): : 281 - 284
  • [27] A Proxy Blind Signature Scheme Based on DLP
    YU Baozheng
    Wuhan University Journal of Natural Sciences, 2007, (01) : 83 - 86
  • [28] ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG
    Yu, Yihua
    Zheng, Shihui
    Yang, Yixian
    ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2008, 6 : 821 - 824
  • [29] Cryptanalysis and improvement of a threshold proxy signature scheme
    Hu, Jianghong
    Zhang, Jianzhong
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 169 - 173
  • [30] Cryptanalysis and improvement of a new proxy signature scheme
    Lu, Rong-Bo
    He, Da-Ke
    Wang, Chang-Ji
    Miao, Xiang-Hua
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2007, 29 (10): : 2529 - 2532