Cryptanalysis of some proxy signature schemes without certificates

被引:0
|
作者
Yap, Wun-She [1 ]
Heng, Swee-Huay [2 ]
Goi, Bok-Min [1 ]
机构
[1] Multimedia Univ, Ctr Cryptography & Informat Secur, Fac Engn, Selangor 63100, Malaysia
[2] Multimedia Univ, Ctr Cryptog & Informat secur, Fac Informat Sci & Technol, Melaka 75450, Malaysia
关键词
proxy signature; identity-based; certificateless; attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of proxy signature was introduced by Mambo et al. to delegate signing capability in the digital world. In this paper, we show that three existing proxy signature schemes without certificates, namely, the Qian and Cao identity-based proxy signature (IBPS) scheme, the Guo et al. IBPS scheme and the Li et al. certificateless proxy signature (CLPS) scheme are insecure against universal forgery.. More precisely, we show that any user who has a valid public-private key pair can act as. a cheating proxy signer and forge the proxy signature on behalf of the original signer at will, without obtaining the official delegation from the original signer.
引用
收藏
页码:115 / +
页数:3
相关论文
共 50 条
  • [1] Cryptanalysis and Improvement of Some Quantum Proxy Blind Signature Schemes
    Zhang, Long
    Li, Shuang
    Zhang, Ke-Jia
    Sun, Hong-Wei
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (04) : 1047 - 1059
  • [2] Cryptanalysis of some group-oriented proxy signature schemes
    Park, JH
    Kang, BG
    Park, S
    [J]. INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 10 - 24
  • [3] Cryptanalysis and Improvement of Some Quantum Proxy Blind Signature Schemes
    Long Zhang
    Shuang Li
    Ke-Jia Zhang
    Hong-Wei Sun
    [J]. International Journal of Theoretical Physics, 2019, 58 : 1047 - 1059
  • [4] Cryptanalysis of efficient proxy signature schemes for mobile communication
    Li FaGen
    Shirase Masaaki
    Takagi Tsuyoshi
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (10) : 2016 - 2021
  • [5] Cryptanalysis of efficient proxy signature schemes for mobile communication
    FaGen Li
    Masaaki Shirase
    Tsuyoshi Takagi
    [J]. Science China Information Sciences, 2010, 53 : 2016 - 2021
  • [6] Cryptanalysis of efficient proxy signature schemes for mobile communication
    SHIRASE Masaaki
    TAKAGI Tsuyoshi
    [J]. Science China(Information Sciences), 2010, 53 (10) : 2016 - 2021
  • [7] Cryptanalysis of nonrepudiable threshold proxy signature schemes with known signers
    Hwang, SJ
    Chen, CC
    [J]. INFORMATICA, 2003, 14 (02) : 205 - 212
  • [8] Cryptanalysis of two ECDLP-based proxy signature schemes
    School of Computer Science and Technology, Nanhu Campus, China University of Mining and Technology, Xuzhou 221116, China
    [J]. J. Comput. Inf. Syst., 2008, 5 (2161-2165):
  • [9] Cryptanalysis of Two Proxy Signature Schemes with Restricted Times of Delegation
    Yen, Sung-Ming
    Wang, Jian-Hong
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA 2013), 2013,
  • [10] Improvement of some proxy signature schemes
    Li, JG
    Liang, ZH
    Zhu, YL
    Zhang, YC
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03) : 407 - 411