The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it

被引:0
|
作者
Jyh-haw Yeh
机构
[1] Boise State University,Department of Computer Science
来源
关键词
Proxy signcryption; Proxy credential forgery attack ; Bilinear pairings;
D O I
暂无
中图分类号
学科分类号
摘要
Securing different online e-business activities usually requires applying different cryptographic algorithms. The proxy signcryption algorithms are designed for applications such as online proxy auction or online proxy signatures on business contracts, which require a proxy agent to sign on confidential messages. This paper proposes a proxy credential forgery attack to two recent proxy signcryption schemes in the literature. Using the attack, a malicious proxy signer can create a fake proxy credential from his original credential to extend his signing power. Simple modifications to these two schemes are also provided in this paper to prevent the attack without adding too much computational complexity. In addition to the contribution of introducing a new type of attacks to signcryption schemes, the paper also points out that, while designing a secure proxy signcryption scheme, not only the unforgeability of proxy signatures is important, but also that of proxy credentials as well.
引用
收藏
页码:1100 / 1119
页数:19
相关论文
共 28 条
  • [1] The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it
    Yeh, Jyh-haw
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 70 (03): : 1100 - 1119
  • [2] Two proxy signcryption schemes from bilinear pairings
    Wang, Q
    Cao, ZF
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 161 - 171
  • [3] Identity-based proxy signcryption schemes
    Jian, Wu
    [J]. INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
  • [4] Constructing secure warrant-based proxy signcryption schemes
    Zhou, Y
    Cao, ZF
    Lu, RX
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 172 - 185
  • [5] Cryptoanlaysis of Two Proxy Blind Signature schemes with Proxy Revocation
    Zhang, Jianhong
    Gao, Shengnan
    [J]. PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 3189 - 3192
  • [6] Forgery attack on one-time proxy signature and the improvement
    Yang, Chun-Wei
    Luo, Yi-Ping
    Hwang, Tzonelih
    [J]. QUANTUM INFORMATION PROCESSING, 2014, 13 (09) : 2007 - 2016
  • [7] Forgery attack on one-time proxy signature and the improvement
    Chun-Wei Yang
    Yi-Ping Luo
    Tzonelih Hwang
    [J]. Quantum Information Processing, 2014, 13 : 2007 - 2016
  • [8] Forgeability Attack of Two DLP-Base Proxy Blind Signature Schemes
    Zhang, Jianhong
    Guo, Fenhong
    Sun, Zhibin
    Wang, Jilin
    [J]. ADVANCES IN SWARM INTELLIGENCE, PT II, 2011, 6729 : 395 - +
  • [9] Analysis of Forgery Attack on One-Time Proxy Signature and the Improvement
    Wang, Tian-Yin
    Wei, Zong-Li
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2016, 55 (02) : 743 - 745
  • [10] Analysis of Forgery Attack on One-Time Proxy Signature and the Improvement
    Tian-Yin Wang
    Zong-Li Wei
    [J]. International Journal of Theoretical Physics, 2016, 55 : 743 - 745