Proxy-protected signature secure against the undelegated proxy signature attack

被引:18
|
作者
Liu, Yu-Chuan
Wen, Hsiang-An
Lin, Chun-Li
Hwang, Tzonelih
机构
[1] Shu Te Univ, Dept Comp Sci & Informat Engn, Yen Chau, Kaohsiung, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 70101, Taiwan
[3] Leader Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
关键词
digital signature; proxy signature; proxy-protected; integer factorization; RSA;
D O I
10.1016/j.compeleceng.2006.11.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The proxy signature scheme enables an original signer to delegate his/her signing capability to a designated proxy signer, thereby the proxy signer can sign messages on behalf of the original signer. Recently, Zhou et al. proposed two proxy-protected signature schemes. One is based on the RSA problem and the other is based on the integer factorization problem. In this paper, however, we point out that Zhou et al.'s schemes are insecure against undelegated proxy signature attack because any user without the delegation of the original signer can generate a valid proxy signature. To solve this problem, an improved scheme is proposed and its security is analyzed. (C) 2007 Elsevier Ltd. All rights reserved.
引用
收藏
页码:177 / 185
页数:9
相关论文
共 50 条
  • [1] Provably secure proxy-protected signature schemes based on factoring
    Zhou, Y
    Cao, ZF
    Lu, RX
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (01) : 83 - 98
  • [2] Provably secure proxy-protected signature schemes based on RSA
    Shao, Zuhua
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) : 497 - 505
  • [3] Cryptanalysis and improvement of a proxy-protected signature scheme
    Hu, Xiaoming
    Zhang, Zhe
    Wang, Tong
    [J]. SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 363 - 366
  • [4] Attacks on provably secure proxy-protected signature schemes based on factoring
    Wu, Chia-Chi
    Chang, Chin-Chen
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (02): : 193 - 204
  • [5] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Chen, TS
    Liu, TP
    Chung, YF
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
  • [6] A Proxy-Protected Signature Scheme Based on Finite Automaton
    Cao, Fe
    Cao, Zhenfu
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 48 - +
  • [7] An efficient proxy-protected signature scheme based on factoring
    Zhou, Y
    Cao, ZF
    Chai, ZC
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 332 - 341
  • [8] A Controlled Proxy-Protected Signature Scheme with Instantaneous Revocation
    Shehata, Khaled
    Selim, Gamal
    Elgindy, Maged
    Kouta, Mohamed Mohamed
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (03): : 27 - 30
  • [9] Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Wang, SH
    Wang, GL
    Bao, F
    Wang, J
    [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3240 - 3243
  • [10] An Efficient Forward-Secure Proxy-Protected Signature Scheme Based on the Strong RSA Assumption
    Naji, Akram A. M.
    Abu Hasan, Yahya
    [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 259 - 264