An improved nominative proxy signature for mobile communication

被引:5
|
作者
Zhang, JH [1 ]
Wu, QH [1 ]
机构
[1] Xidian Univ, State Key Lab ISN, Xian 710071, Peoples R China
来源
关键词
nominative proxy signature; security analysis; improved scheme;
D O I
10.1093/ietisy/e88-d.7.1697
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a specific signature, the nominative proxy signature scheme is a method in which the designated proxy signer generates a nominative signature and transmits it to a verifier, instead of the original signer. Recently, Seo et al. proposed a nominative proxy signature scheme for mobile communication and claimed that the scheme hash non-repudiation. However, after analyzing the scheme, we show that the scheme is insecure and cannot provide non-repudiation, note that a malicious original signer can forge the proxy signer to sign on any message. Finally, we also present a modification version of the scheme to repair the security flaw.
引用
收藏
页码:1697 / 1699
页数:3
相关论文
共 50 条
  • [31] An improved designated-verifier proxy signature scheme
    Zhang, Jianhong
    INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, PROCEEDINGS, 2007, : 77 - 82
  • [32] Formal definition and construction of nominative signature
    Liu, Dennis Y. W.
    Wong, Duncan S.
    Huang, Xinyi
    Wang, Guilin
    Huang, Qiong
    Mu, Yi
    Susilo, Willy
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 57 - +
  • [33] A more efficient convertible nominative signature
    Liu, Dennis Y. W.
    Chang, Shuang
    Wong, Duncan S.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 214 - 221
  • [34] An Efficient ID based Proxy Signature, Proxy Blind Signature and Proxy Partial Blind Signature
    Majhi, Banshidhar
    Sahu, Deepak Kumar
    Subudhi, RamNarayan
    ICIT 2008: PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 19 - 23
  • [35] Aggregate proxy signature and verifiably encrypted proxy signature
    Li, Jin
    Kim, Kwangjo
    Zhang, Fangguo
    Chen, Xiaofeng
    PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 208 - +
  • [36] An improved threshold proxy signature scheme based on the RSA cryptosystem
    Xue, QS
    Cao, ZF
    Tang, FL
    PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, 2004, : 901 - 907
  • [37] An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography
    Sun, Xue
    Xia, Mingping
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 88 - 91
  • [38] An improved nonrepudiable threshold proxy signature scheme with known signers
    Liu, Xin
    Xu, Qiu-Liang
    Shang, Jiu-Qing
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 298 - +
  • [39] Security remarks on a convertible nominative signature scheme
    Wang, Guilin
    Bao, Feng
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 265 - +
  • [40] Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
    Yu, Yong
    Mu, Yi
    Susilo, Willy
    Au, Man Ho
    INFORMATION PROCESSING LETTERS, 2014, 114 (1-2) : 5 - 8