Analysis of Forgery Attack on One-Time Proxy Signature and the Improvement

被引:0
|
作者
Tian-Yin Wang
Zong-Li Wei
机构
[1] Luoyang Normal University,School of Mathematical Science
[2] Luoyang Normal University,Start Travel Collaborative Innovation Center of Zhongyuan Economic Area
关键词
Proxy signature; Unforgeability; Undeniability; Quantum cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
In a recent paper, Yang et al. (Quant. Inf. Process. 13(9), 2007–2016, 2014) analyzed the security of one-time proxy signature scheme Wang and Wei (Quant. Inf. Process. 11(2), 455–463, 2012) and pointed out that it cannot satisfy the security requirements of unforgeability and undeniability because an eavesdropper Eve can forge a valid proxy signature on a message chosen by herself. However, we find that the so-called proxy message-signature pair forged by Eve is issued by the proxy signer in fact, and anybody can obtain it as a requester, which means that the forgery attack is not considered as a successful attack. Therefore, the conclusion that this scheme cannot satisfy the security requirements of proxy signature against forging and denying is not appropriate in this sense. Finally, we study the reason for the misunderstanding and clarify the security requirements for proxy signatures.
引用
收藏
页码:743 / 745
页数:2
相关论文
共 50 条
  • [41] An impersonation attack on one-time password authentication protocol OSPA
    Tsuji, T
    Shimizu, A
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (07) : 2182 - 2185
  • [42] Strongly Unforgeable Signature Scheme without One-Time Key
    Tantikittipisut, Watcharee
    Premasathain, Nol
    [J]. PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, 2009, : 313 - 316
  • [43] Secure AODV routing protocol using one-time signature
    Xu, SD
    Mu, Y
    Susilo, W
    [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2005, 3794 : 288 - 297
  • [44] A one-time signature using run-length encoding
    Steinwandt, Rainer
    Villanyi, Viktoria I.
    [J]. INFORMATION PROCESSING LETTERS, 2008, 108 (04) : 179 - 185
  • [45] Constant-Sum Fingerprinting for Winternitz One-Time Signature
    Cruz, Jason Paul
    Yatani, Yoshio
    Kaji, Yuichi
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 703 - 707
  • [46] Proxy-protected signature secure against the undelegated proxy signature attack
    Liu, Yu-Chuan
    Wen, Hsiang-An
    Lin, Chun-Li
    Hwang, Tzonelih
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (03) : 177 - 185
  • [47] Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
    Wang, Qiyan
    Khurana, Himanshu
    Huang, Ying
    Nahrstedt, Klara
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 1233 - 1241
  • [48] The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it
    Jyh-haw Yeh
    [J]. The Journal of Supercomputing, 2014, 70 : 1100 - 1119
  • [49] The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it
    Yeh, Jyh-haw
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 70 (03): : 1100 - 1119
  • [50] On one-time cookies protocol based on one-time password
    Junhui He
    Dezhi Han
    Kuan-Ching Li
    [J]. Soft Computing, 2020, 24 : 5657 - 5670