Improvement on Li et al.'s generalization of proxy signature schemes

被引:4
|
作者
Hwang, SJ [1 ]
Chan, CC [1 ]
机构
[1] Tamkang Univ, Dept Comp Sci & Informat Engn, Taipei 251, Taiwan
关键词
proxy signatures scheme; proxy threshold signature scheme; multi-proxy signature scheme; proxy multi-signature scheme; multi-proxy multi-signature scheme; digital signature scheme;
D O I
10.1016/j.cose.2004.06.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Li et aL proposed their generalization of proxy signature schemes. However, all of Li et al.'s schemes have a common security weakness. In Li et al.'s schemes, an adversary first intercepts a valid proxy signature generated by a proxy group on behalf of the proxy group G(p). From the intercepted proxy signature, the adversary can forge illegal proxy signatures being likely generated by the proxy group on behalf of an adversary. To overcome this weakness, our improvement is also proposed. (C) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:615 / 619
页数:5
相关论文
共 50 条
  • [31] Security of Wang et al.'s group-oriented (t, n) threshold signature schemes with traceable signers
    Li, ZC
    Hui, LCK
    Chow, KP
    Chong, CF
    Tsang, WW
    Chan, HW
    [J]. INFORMATION PROCESSING LETTERS, 2001, 80 (06) : 295 - 298
  • [32] New Forgery Attack on Chang et al.'s signature scheme
    Li, Kou
    Ming, Jin
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 5 - 6
  • [33] Cryptanalysis of Chang et al.'s signature scheme with message recovery
    Zhang, FG
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (04) : 358 - 359
  • [34] Attack on Chen et al.'s certificateless aggregate signature scheme
    Zhang, Jianhong
    Zhao, Xubing
    Mao, Jian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (01) : 54 - 59
  • [35] Traceability on Stadler et al.'s fair blind signature scheme
    Hwang, MS
    Lee, CC
    Lai, YC
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (02) : 513 - 514
  • [36] Analysis on traceability on Stadler et al.'s fair blind signature
    Lee, NY
    Sun, MK
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (11) : 2901 - 2902
  • [37] Traceability on Stadler et al.'s fair blind signature scheme
    Hwang, Min-Shiang
    Lee, Cheng-Chi
    Lai, Yan-Chi
    [J]. 2003, Institute of Electronics, Information and Communication, Engineers, IEICE (E86-A)
  • [38] The Security Analysis and Improvement of Some Novel Quantum Proxy Signature Schemes
    Long Zhang
    Hai-Yan Zhang
    Ke-Jia Zhang
    Qing-Le Wang
    [J]. International Journal of Theoretical Physics, 2017, 56 : 1983 - 1994
  • [39] The Security Analysis and Improvement of Some Novel Quantum Proxy Signature Schemes
    Zhang, Long
    Zhang, Hai-Yan
    Zhang, Ke-Jia
    Wang, Qing-Le
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2017, 56 (06) : 1983 - 1994
  • [40] Improvement of Tseng et al.'s authenticated encryption scheme
    Hwang, SJ
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 165 (01) : 1 - 4