Cryptanalysis of ID based Proxy-Blind signature scheme over lattice

被引:7
|
作者
Rawal, Swati [1 ]
Padhye, Sahadeo [1 ]
机构
[1] Motilal Nehru Natl Inst Technol, Dept Math, Allahabad 211004, Uttar Pradesh, India
来源
ICT EXPRESS | 2020年 / 6卷 / 01期
关键词
Lattice cryptography; Cryptanalysis; Proxy signature; Blind signature;
D O I
10.1016/j.icte.2019.05.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article we review the ID Based Proxy-Blind signature scheme proposed by Zhang et al. and we give an attack on the scheme revealing the master secret key used in the construction of their scheme. (C) 2020 The Korean Institute of Communications and Information Sciences (KICS). Publishing services by Elsevier B.V.
引用
下载
收藏
页码:20 / 22
页数:3
相关论文
共 50 条
  • [31] Cryptanalysis on a proxy multi-signature scheme
    Cao, Feng
    Cao, Zhenfu
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 117 - +
  • [32] Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme
    Tan, Zuo-Wen
    Liu, Zhuo-Jun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2009, 25 (02) : 619 - 631
  • [33] Cryptanalysis of a blind signature scheme based on the ELGamal signatures
    School of Management, Hefei University of Technology, Hefei 230009, China
    Zhongshan Daxue Xuebao, 2006, SUPPL. (38-40):
  • [34] Cryptanalysis of the PEREGRINE Lattice-Based Signature Scheme
    Lin, Xiuhan
    Suzuki, Moeto
    Zhang, Shiduo
    Espitau, Thomas
    Yu, Yang
    Tibouchi, Mehdi
    Abe, Masayuki
    PUBLIC-KEY CRYPTOGRAPHY, PT I, PKC 2024, 2024, 14601 : 387 - 412
  • [35] Cryptanalysis of Quantum Blind Signature Scheme
    Zuo, Huijuan
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52 (01) : 322 - 329
  • [36] Cryptanalysis of Quantum Blind Signature Scheme
    Huijuan Zuo
    International Journal of Theoretical Physics, 2013, 52 : 322 - 329
  • [37] A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model
    Zhang, Lili
    Ma, Yanqin
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [38] Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Wang, SH
    Wang, GL
    Bao, F
    Wang, J
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3240 - 3243
  • [39] A proxy blind signature scheme with proxy revocation
    Park, Ji-Hye
    Kim, Young-Seol
    Chang, Jik Hyun
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 761 - +
  • [40] ID-based proxy signature scheme with message recovery
    Singh, Harendra
    Verma, Girraj Kumar
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (01) : 209 - 214