An Improved ID-based Proxy Signature Scheme with Message Recovery

被引:0
|
作者
Zhou, Caixue [1 ]
机构
[1] Univ Jiujiang, Sch Informat Sci & Technol, Jiujiang 332005, Jiangxi, Peoples R China
关键词
identity-based proxy signature; signature with message recovery; bilinear pairing; unforgeability; forking lemma;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2012, Singh and Verma proposed an ID-based proxy signature scheme with message recovery. In this paper, we show that their scheme is vulnerable to the forgery attack, and an adversary can forge a valid proxy signature for any message with knowing a previous valid proxy signature. In addition, there is a security flaw in their proof. Furthermore, we propose an improved scheme that remedies the weakness of their scheme, and the improved scheme can be proved existentially unforgeable-adaptively chosen message and ID attack assuming the computational Diffie-Hellman problem is hard.
引用
收藏
页码:151 / 163
页数:13
相关论文
共 50 条
  • [41] A New ID-Based Proxy Multi-Signature Scheme from Bilinear Pairings
    GU Chun-xiang
    [J]. Wuhan University Journal of Natural Sciences, 2006, (01) : 193 - 197
  • [42] Improvement of ID-based proxy re-signature scheme with pairing-free
    Jianhong Zhang
    [J]. Wireless Networks, 2019, 25 : 4319 - 4329
  • [43] Efficient ID-based proxy multi-signature scheme secure in random oracle
    Rajeev Anand Sahu
    Sahadeo Padhye
    [J]. Frontiers of Computer Science, 2012, 6 : 421 - 428
  • [44] An Improved ID-Based Multi-Proxy Multi-Signcryption Scheme
    Zhou Xiaoyan
    Wu Yan
    Du Weifeng
    Gao Yan
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 466 - +
  • [45] ID-based Signature Scheme with Tight Reduction
    Xin Xiangjun
    Huang Shoujia
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 347 - 351
  • [46] A Practical ID-Based Group Signature Scheme
    Cheng, Xiangguo
    Zhou, Shaojie
    Yu, Jia
    Li, Xin
    Ma, Huiran
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (11) : 2650 - 2654
  • [47] An efficient hierarchical ID-Based signature scheme
    Yu, J
    Li, DX
    Hao, R
    [J]. Proceedings of the 11th Joint International Computer Conference, 2005, : 92 - 95
  • [48] Novel ID-Based Group Signature Scheme
    Zhang, Jianhong
    Geng, Qin
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12634 - 12637
  • [49] An ID-based multi-signature scheme
    Meng, Tao
    Zhang, Xinping
    Sun, Shenghe
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 115 - 117
  • [50] Secure ID-based proxy signcryption scheme with designated proxy signcrypter
    Tian, Xiu-Xia
    Xu, Jian-Ping
    Li, Hong-Jiao
    Peng, Yuan
    Zhang, An-Qin
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355