Forgery attack on one-time proxy signature and the improvement

被引:13
|
作者
Yang, Chun-Wei [1 ]
Luo, Yi-Ping [1 ]
Hwang, Tzonelih [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 70101, Taiwan
关键词
Forgery attack; One-time proxy signature; Decoherence-free state; Quantum cryptography; ARBITRATED QUANTUM SIGNATURE; CLASSICAL MESSAGES; KEY DISTRIBUTION; CRYPTOGRAPHY; SECURITY;
D O I
10.1007/s11128-014-0795-x
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
This paper points out that in Wang and Wei's scheme (Quantum Inf Process 11:455-463, 2012), an eavesdropper, Eve, can replace the original message of a proxy signature with a forged one of her choice without being detected by the verifier. Accordingly, one of the security requirements of a quantum signature, i.e., unforgeability, may not be satisfied in their scheme. An improvement is given to avoid this attack, and the comparisons with the existing quantum proxy signature are also demonstrated.
引用
收藏
页码:2007 / 2016
页数:10
相关论文
共 50 条
  • [41] Secure AODV routing protocol using one-time signature
    Xu, SD
    Mu, Y
    Susilo, W
    [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2005, 3794 : 288 - 297
  • [42] A one-time signature using run-length encoding
    Steinwandt, Rainer
    Villanyi, Viktoria I.
    [J]. INFORMATION PROCESSING LETTERS, 2008, 108 (04) : 179 - 185
  • [43] Constant-Sum Fingerprinting for Winternitz One-Time Signature
    Cruz, Jason Paul
    Yatani, Yoshio
    Kaji, Yuichi
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 703 - 707
  • [44] Proxy-protected signature secure against the undelegated proxy signature attack
    Liu, Yu-Chuan
    Wen, Hsiang-An
    Lin, Chun-Li
    Hwang, Tzonelih
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (03) : 177 - 185
  • [45] Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
    Wang, Qiyan
    Khurana, Himanshu
    Huang, Ying
    Nahrstedt, Klara
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 1233 - 1241
  • [46] The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it
    Jyh-haw Yeh
    [J]. The Journal of Supercomputing, 2014, 70 : 1100 - 1119
  • [47] The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it
    Yeh, Jyh-haw
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 70 (03): : 1100 - 1119
  • [48] On one-time cookies protocol based on one-time password
    Junhui He
    Dezhi Han
    Kuan-Ching Li
    [J]. Soft Computing, 2020, 24 : 5657 - 5670
  • [49] Authentication of transit flows and K-siblings one-time signature
    Al-Ibrahim, M
    Pieprzyk, J
    [J]. ADVANCED COMMUNICATIONS AND MULTIMEDIA SECURITY, 2002, 100 : 41 - 55
  • [50] Cryptanalysis of a One-Time Code-Based Digital Signature Scheme
    Santini, Paolo
    Baldi, Marco
    Chiaraluce, Franco
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 2594 - 2598