Remark on Shao et al.'s Bidirectional Proxy Re-signature Scheme in Indocrypt'07
نویسندگان
چکیده
Recently, Shao et al. proposed two bidirectional proxy re-signature schemes Smb and Sid−mb [3]. In their paper, the authors gave security proofs to say that both of them are secure in their security model without random oracles. But, we found that the scheme Smb is miss leaded and its security proof is false. In this paper, we present an attack on Smb and improve it to be secure in their security model.
منابع مشابه
Proxy Re-signature Schemes Without Random Oracles
To construct a suitable and secure proxy re-signature scheme is not an easy job, up to now, there exist only three schemes, one is proposed by Blaze et al. [6] at EUROCRYPT 1998, and the others are proposed by Ateniese and Hohenberger [2] at ACM CCS 2005. However, none of these schemes is proved in the standard model (i.e., do not rely on the random oracle heuristic). In this paper, based on Wa...
متن کاملComments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009
In Eurocrypt’98, Blaze, Bleumer and Strauss [4] introduced a primitive named proxy reencryption (PRE), in which a semi-trusted proxy can convert without seeing the plaintext a ciphertext originally intended for Alice into an encryption of the same message intended for Bob. PRE systems can be categorized into bidirectional PRE, in which the proxy can transform from Alice to Bob and vice versa, a...
متن کاملOn Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification
In 2004, Tzeng, Yang and Hwang proposed a nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. However, Bao, Cao and Wang pointed out that Tzeng et al.’s scheme cannot resist frame attacks and therefore presented an improved version. In this paper, we will show that there is another security flaw existing in both Tzeng et al.’s scheme and Bao et al.’s scheme.
متن کاملID-based Proxy Re-signature with Aggregate Property
Recently, Garg et al. proposed an approximate candidate of leveled multi-linear map that can be used for unrestricted aggregation. In this work, we explore building construction of ID-based proxy re-signature with aggregate property, which has many applications. Our construction utilizes the full domain hash structure from multi-linear map proposed by Hohenburger et al. In particular, Hohenburg...
متن کاملDouble voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 9 شماره
صفحات -
تاریخ انتشار 2009