Improvement on Li et al.'s generalization of proxy signature schemes

被引:4
|
作者
Hwang, SJ [1 ]
Chan, CC [1 ]
机构
[1] Tamkang Univ, Dept Comp Sci & Informat Engn, Taipei 251, Taiwan
关键词
proxy signatures scheme; proxy threshold signature scheme; multi-proxy signature scheme; proxy multi-signature scheme; multi-proxy multi-signature scheme; digital signature scheme;
D O I
10.1016/j.cose.2004.06.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Li et aL proposed their generalization of proxy signature schemes. However, all of Li et al.'s schemes have a common security weakness. In Li et al.'s schemes, an adversary first intercepts a valid proxy signature generated by a proxy group on behalf of the proxy group G(p). From the intercepted proxy signature, the adversary can forge illegal proxy signatures being likely generated by the proxy group on behalf of an adversary. To overcome this weakness, our improvement is also proposed. (C) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:615 / 619
页数:5
相关论文
共 50 条
  • [1] Improvement on Hwang et al.'s generalization of proxy signature schemes based on elliptic curves
    Hwang, SJ
    Huang, CW
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 941 - 947
  • [2] Improvement of Yang et al.'s threshold proxy signature scheme
    Shao, Jun
    Cao, Zhenfu
    Lu, Rongxing
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) : 172 - 177
  • [3] Cryptanalysis of Zhou et al.'s proxy-protected signature schemes
    Park, JH
    Kang, BG
    Han, JW
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 192 - 197
  • [4] Improvement on Huang et al.'s Novel Efficient Threshold Proxy Signature Scheme
    Hu, Jiang-hong
    Huang, Mei-juan
    Zhang, Jian-zhong
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 116 - 119
  • [5] Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes
    Wu, LC
    Yeh, YS
    Liu, TS
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (02) : 176 - 179
  • [6] Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers
    Xie, Q
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 776 - 782
  • [7] On the proxy-protected property of Chen et al.'s proxy multisignature schemes
    Huang, Pei-Hui
    Wen, Hsiang-An
    Wang, Chih-Hung
    Hwang, Tzonelih
    [J]. INFORMATICA, 2007, 18 (01) : 55 - 60
  • [8] Cryptanalysis and improvement on Chang et al.'s signature scheme
    Wang, Qing-Long
    Han, Zhen
    Geng, Xiu-Hua
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 112 - 114
  • [9] An improvement on Yang et al.'s password authentication schemes
    Kim, KW
    Jeon, JC
    Yoo, KY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (01) : 207 - 215
  • [10] Security of Lu et al.'s proxy-protected signature scheme
    Park, JH
    Kang, BG
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1010 - 1015