On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes
نویسندگان
چکیده
Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem. However, this paper shows that the original signers can produce a valid signature as the proxy signer does in the proxy protected scheme. Therefore, Chen et al.’s proxy-protected scheme cannot protect the proxy signer from being forged by the original signers. We further find that the early work of Chen et al. in 2003 suffers the same attack. To overcome this problem, an improved scheme will be presented.
منابع مشابه
An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants
The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multisignature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer’s identities in place of the public keys and their certificates. In the literature, most identitybased multi-proxy signature, proxy multi-signature and multi-proxy mult...
متن کامل“Untraceability” Analysis of Two ID-Based Proxy Blind Signature from Bilinear Pairings
“Untraceability” is an important property of Proxy blind signature. Zhang proposed some new untraceable blind signatures in order to enhance the security of Cai et al. (2007) and Hu et al. (2007)’s schemes. However, this study shows there are three important conclusions: 1. By reduction, we prove that the cryptanalysis method proposed by Zhang is improper and Cai et al. (2007)’s schemes does sa...
متن کاملID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings
Multi-proxy signature allows the original signer delegate his singing power to a group of proxy signers. Blind proxy-signature allows the user to obtain a signature of a message from several signers in a way that each signer learns neither the message nor the resulting signature. Plenty of multi-proxy signature and blind multisignature schemes have been proposed under the certificate-based (CA-...
متن کاملOriginal Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes
A proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer. In this paper, we demonstrate that a number of discrete logarithm based proxy signature schemes are vulnerable to an original signer’s forgery attack. In this attack, a malicious original signer can impersonate a proxy signer and produce a forged proxy signature on a message. A third party will in...
متن کاملAnalysis of Sun et al.'s linkability attack on some proxy blind signature schemes
The proxy blind signature scheme allows the designated proxy signer using the proxy secret key to generate a blind signature on behalf of the original signer. Tan et al. presented the DLP-based and ECDLP based blind signature schemes. Awasthi and Lal proposed a improved DLP-based scheme later. Recently, Sun et al. presented linkability attack on Tan et al. s and Awasthi–Lal s proxy blind signat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Informatica, Lith. Acad. Sci.
دوره 18 شماره
صفحات -
تاریخ انتشار 2007