On the security of some proxy blind signature schemes

被引:21
|
作者
Sun, HM
Hsieh, BT
Tseng, SM
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30055, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
cryptanalysis; proxy blind signature; elliptic curve; cryptography;
D O I
10.1016/j.jss.2004.02.015
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A proxy blind signature scheme is a digital signature scheme which combines the properties of proxy signature and blind signature schemes. Recently, Tan et al. proposed two proxy blind signature schemes based on DLP and ECDLP respectively. Later, compared with Tan et al.'s scheme, Lal and Awasthi further proposed a more efficient proxy blind signature scheme. In this paper, we show that both Tan et al.'s schemes do not satisfy the unforgeability and unlinkability properties. Moreover, we also point out that Lal and Awasthi's scheme does not possess the unlinkability property either. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:297 / 302
页数:6
相关论文
共 50 条
  • [1] On the security of some nonrepudiable threshold proxy signature schemes
    Tan, ZW
    Liu, ZJ
    Wang, MS
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 374 - 385
  • [2] Cryptanalysis and Improvement of Some Quantum Proxy Blind Signature Schemes
    Zhang, Long
    Li, Shuang
    Zhang, Ke-Jia
    Sun, Hong-Wei
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (04) : 1047 - 1059
  • [3] Cryptanalysis and Improvement of Some Quantum Proxy Blind Signature Schemes
    Long Zhang
    Shuang Li
    Ke-Jia Zhang
    Hong-Wei Sun
    [J]. International Journal of Theoretical Physics, 2019, 58 : 1047 - 1059
  • [4] Security analysis and improvement of some threshold proxy signature schemes
    Xue, QS
    Cao, ZF
    [J]. DCABES 2004, PROCEEDINGS, VOLS, 1 AND 2, 2004, : 947 - 952
  • [5] Provable security of proxy signature schemes
    Gu, CX
    Zhu, YF
    [J]. ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1059 - 1063
  • [6] The Security Analysis and Improvement of Some Novel Quantum Proxy Signature Schemes
    Long Zhang
    Hai-Yan Zhang
    Ke-Jia Zhang
    Qing-Le Wang
    [J]. International Journal of Theoretical Physics, 2017, 56 : 1983 - 1994
  • [7] The Security Analysis and Improvement of Some Novel Quantum Proxy Signature Schemes
    Zhang, Long
    Zhang, Hai-Yan
    Zhang, Ke-Jia
    Wang, Qing-Le
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2017, 56 (06) : 1983 - 1994
  • [8] Security of proxy blind signature scheme
    Zhang, Jianhong
    Cui, Yuanbo
    Chen, Zhipeng
    [J]. Information Technology Journal, 2013, 12 (03) : 466 - 469
  • [9] Cryptoanlaysis of Two Proxy Blind Signature schemes with Proxy Revocation
    Zhang, Jianhong
    Gao, Shengnan
    [J]. PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 3189 - 3192
  • [10] Improvement of some proxy signature schemes
    Li, JG
    Liang, ZH
    Zhu, YL
    Zhang, YC
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03) : 407 - 411