An Improved ID-based Proxy Signature Scheme with Message Recovery

被引:0
|
作者
Zhou, Caixue [1 ]
机构
[1] Univ Jiujiang, Sch Informat Sci & Technol, Jiujiang 332005, Jiangxi, Peoples R China
关键词
identity-based proxy signature; signature with message recovery; bilinear pairing; unforgeability; forking lemma;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2012, Singh and Verma proposed an ID-based proxy signature scheme with message recovery. In this paper, we show that their scheme is vulnerable to the forgery attack, and an adversary can forge a valid proxy signature for any message with knowing a previous valid proxy signature. In addition, there is a security flaw in their proof. Furthermore, we propose an improved scheme that remedies the weakness of their scheme, and the improved scheme can be proved existentially unforgeable-adaptively chosen message and ID attack assuming the computational Diffie-Hellman problem is hard.
引用
收藏
页码:151 / 163
页数:13
相关论文
共 50 条
  • [1] ID-based proxy signature scheme with message recovery
    Singh, Harendra
    Verma, Girraj Kumar
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (01) : 209 - 214
  • [2] Cryptanalysis of an ID-based proxy signature scheme with message recovery
    Tian, M.
    Huang, L.
    Yang, W.
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 419 - 422
  • [3] A NEW ID-BASED PROXY BLIND SIGNATURE SCHEME WITH MESSAGE RECOVERY
    Kong, Tingting
    Xu, Qiuliang
    Wong, Zhiqiang
    [J]. 3RD INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE (IEEC 2011), PROCEEDINGS, 2011, : 162 - 165
  • [4] On the security of an ID-based anonymous proxy signature scheme and its improved scheme
    Zhang, Jianhong
    Mao, Jian
    Xu, Yuwei
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2013, 5 (03) : 181 - 188
  • [5] A short ID-based proxy signature scheme
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (05) : 859 - 873
  • [6] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205
  • [7] Efficient ID-Based Proxy Blind Signature Scheme
    ZHANG Qing1
    2. School of Computer
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 105 - 108
  • [8] A New ID-Based Proxy Blind Signature Scheme
    LANG Wei-min~1
    2. People’s Liberation Army Institute of Communications Command
    [J]. Wuhan University Journal of Natural Sciences, 2005, (03) : 555 - 558
  • [9] An Efficient ID-based Proxy Ring Signature Scheme
    Wu Lei
    Li Daxing
    [J]. 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +
  • [10] A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME
    Ming Yang Wang Yumin (State Key Lab of Integrated Service Network
    [J]. Journal of Electronics(China), 2008, (02) : 226 - 231