An Improved ID-based Proxy Signature Scheme with Message Recovery

被引:0
|
作者
Zhou, Caixue [1 ]
机构
[1] Univ Jiujiang, Sch Informat Sci & Technol, Jiujiang 332005, Jiangxi, Peoples R China
关键词
identity-based proxy signature; signature with message recovery; bilinear pairing; unforgeability; forking lemma;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2012, Singh and Verma proposed an ID-based proxy signature scheme with message recovery. In this paper, we show that their scheme is vulnerable to the forgery attack, and an adversary can forge a valid proxy signature for any message with knowing a previous valid proxy signature. In addition, there is a security flaw in their proof. Furthermore, we propose an improved scheme that remedies the weakness of their scheme, and the improved scheme can be proved existentially unforgeable-adaptively chosen message and ID attack assuming the computational Diffie-Hellman problem is hard.
引用
收藏
页码:151 / 163
页数:13
相关论文
共 50 条
  • [11] A new improved ID-based proxy ring signature scheme from bilinear pairings
    郎为民
    杨宗凯
    程文青
    谭运猛
    [J]. Journal of Harbin Institute of Technology(New series), 2006, (06) : 688 - 691
  • [12] Another ID-Based Proxy Signature Scheme and Its Extension
    ZHANG Jianhong1
    2. Institute of Software of Chinese Academy of Sciences /State Key Laboratory of Information Security
    3. Institute of Computer Science and Technology
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 33 - 36
  • [13] An efficient ID-Based proxy signature scheme from pairings
    Gu, Chunxian
    Zhu, Yuefei
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
  • [14] PROXY BLIND SIGNATURE SCHEME FOR ID-BASED DESIGNATED VERIFIER
    Zhang, Xiaozhi
    Xi, Junfu
    Wang, Zhengqiang
    [J]. 2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 376 - 379
  • [15] An Enhanced ID-Based Anonymous Proxy Signature Scheme on Pairings
    Hu, Chengyu
    Liu, Pengtao
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 4, 2010, : 343 - 346
  • [16] A new efficient ID-based proxy blind signature scheme
    Lang, WM
    Tan, YM
    Yang, ZK
    Liu, G
    Peng, B
    [J]. ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 407 - 411
  • [17] An ID-based proxy signature scheme secure against proxy key exposure
    Wen, Fengtong
    Cui, Shenjun
    Cui, Jiangning
    [J]. International Journal of Advancements in Computing Technology, 2011, 3 (05) : 108 - 116
  • [18] An ID-based Anonymous-message Anonymous Signature Scheme
    Zhang, Jianhong
    Yang, Yixian
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 462 - +
  • [19] ID-based proxy blind signature
    Dong, Z
    Zheng, H
    Chen, KF
    Kou, WD
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 380 - 383
  • [20] New ID-Based Blind Signature Schemes with Message Recovery
    Zheng, Yanbin
    Zhang, Yuting
    [J]. 2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 2020 - 2023