Cryptanalysis of Li et al.’s Proxy Signature Scheme

نویسنده

  • KEON-JIK LEE
چکیده

This work shows that the security improvement of Li et al. for Park and Lee’s nominative proxy signature scheme is still insecure against the original signer’s forgery. The problem within Li et al. scheme is that the verifier cannot judge the correctness of the parameter generated by the original signer from the received signature. Key-Words: digital signature, authentication, hash function, discrete logarithm

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers

Sun’s nonrepudiation threshold proxy signature scheme is not secure against the collusion attack. In order to guard against the attack, Hwang et al. proposed another threshold proxy signature scheme. However, a new attack is proposed to work on both Hwang et al.’s and Sun’s schemes. By executing this attack, one proxy signer and the original signer can forge any valid proxy signature. Therefore...

متن کامل

Cryptanalysis of Some Proxy Signature Schemes Without Certificates

The concept of proxy signature was introduced by Mambo et al. to delegate signing capability in the digital world. In this paper, we show that three existing proxy signature schemes without certificates, namely, the Qian and Cao identity-based proxy signature (IBPS) scheme, the Guo et al. IBPS scheme and the Li et al. certificateless proxy signature (CLPS) scheme are insecure against universal ...

متن کامل

Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers

In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers. In their scheme, the proxy group cannot deny having signed the proxy signature if they did. However, Hsu et al.’s scheme is vulnerable to some attacks. A malicious original signer or malicious proxy signer can impersonate some other proxy signers to generate proxy signatures. In this article, we shall pr...

متن کامل

Cryptanalysis of Threshold Proxy Signature Schemes 1 )

A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can cooperatively sign messages on behalf of the original signer. In the paper, we review the security of two nonrepudiable threshold proxy signature schemes. We show that Tzeng et al.’s threshold proxy signature scheme is...

متن کامل

Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes

This paper will show that Hsu and Wu’s efficient nonrepudiable threshold proxy signature scheme with known signers and Yang, Tzeng and Hwang’s efficient nonrepudiable threshold proxy signature scheme with known signers are insecure. The malicious original signer can forge a valid threshold proxy signature for any message and any warrant after getting a valid proxy signature. In addition, since ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005