Analysis of Forgery Attack on One-Time Proxy Signature and the Improvement

被引:0
|
作者
Tian-Yin Wang
Zong-Li Wei
机构
[1] Luoyang Normal University,School of Mathematical Science
[2] Luoyang Normal University,Start Travel Collaborative Innovation Center of Zhongyuan Economic Area
关键词
Proxy signature; Unforgeability; Undeniability; Quantum cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
In a recent paper, Yang et al. (Quant. Inf. Process. 13(9), 2007–2016, 2014) analyzed the security of one-time proxy signature scheme Wang and Wei (Quant. Inf. Process. 11(2), 455–463, 2012) and pointed out that it cannot satisfy the security requirements of unforgeability and undeniability because an eavesdropper Eve can forge a valid proxy signature on a message chosen by herself. However, we find that the so-called proxy message-signature pair forged by Eve is issued by the proxy signer in fact, and anybody can obtain it as a requester, which means that the forgery attack is not considered as a successful attack. Therefore, the conclusion that this scheme cannot satisfy the security requirements of proxy signature against forging and denying is not appropriate in this sense. Finally, we study the reason for the misunderstanding and clarify the security requirements for proxy signatures.
引用
收藏
页码:743 / 745
页数:2
相关论文
共 50 条
  • [1] Analysis of Forgery Attack on One-Time Proxy Signature and the Improvement
    Wang, Tian-Yin
    Wei, Zong-Li
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2016, 55 (02) : 743 - 745
  • [2] Forgery attack on one-time proxy signature and the improvement
    Chun-Wei Yang
    Yi-Ping Luo
    Tzonelih Hwang
    [J]. Quantum Information Processing, 2014, 13 : 2007 - 2016
  • [3] Forgery attack on one-time proxy signature and the improvement
    Yang, Chun-Wei
    Luo, Yi-Ping
    Hwang, Tzonelih
    [J]. QUANTUM INFORMATION PROCESSING, 2014, 13 (09) : 2007 - 2016
  • [4] One-time proxy signature based on quantum cryptography
    Tian-Yin Wang
    Zong-Li Wei
    [J]. Quantum Information Processing, 2012, 11 : 455 - 463
  • [5] One-time proxy signature based on quantum cryptography
    Wang, Tian-Yin
    Wei, Zong-Li
    [J]. QUANTUM INFORMATION PROCESSING, 2012, 11 (02) : 455 - 463
  • [6] Security Analysis of Particular Quantum Proxy Blind Signature Against the Forgery Attack
    Zhou, Bao-Min
    Lin, Lian-Dong
    Wang, Wei
    Liu, Ying
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (02) : 465 - 473
  • [7] Security Analysis of Particular Quantum Proxy Blind Signature Against the Forgery Attack
    Bao-Min Zhou
    Lian-Dong Lin
    Wei Wang
    Ying Liu
    [J]. International Journal of Theoretical Physics, 2020, 59 : 465 - 473
  • [9] Attack and improvement of a proxy blind signature
    Ren, De-Bin
    Hu, Yong
    Fang, Yong
    [J]. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2007, 39 (06): : 119 - 122
  • [10] New One-Time Proxy Signature Scheme based on DLP using the Warrant
    Kim, Young-Seol
    Chang, Jik Hyun
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (02): : 215 - 220