Remark on Shao et al.'s Bidirectional Proxy Re-signature Scheme in Indocrypt'07

نویسندگان

  • Kitae Kim
  • Ikkwon Yie
  • Seongan Lim
چکیده

Recently, Shao et al. proposed two bidirectional proxy re-signature schemes Smb and Sid−mb [3]. In their paper, the authors gave security proofs to say that both of them are secure in their security model without random oracles. But, we found that the scheme Smb is miss leaded and its security proof is false. In this paper, we present an attack on Smb and improve it to be secure in their security model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proxy Re-signature Schemes Without Random Oracles

To construct a suitable and secure proxy re-signature scheme is not an easy job, up to now, there exist only three schemes, one is proposed by Blaze et al. [6] at EUROCRYPT 1998, and the others are proposed by Ateniese and Hohenberger [2] at ACM CCS 2005. However, none of these schemes is proved in the standard model (i.e., do not rely on the random oracle heuristic). In this paper, based on Wa...

متن کامل

Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009

In Eurocrypt’98, Blaze, Bleumer and Strauss [4] introduced a primitive named proxy reencryption (PRE), in which a semi-trusted proxy can convert without seeing the plaintext a ciphertext originally intended for Alice into an encryption of the same message intended for Bob. PRE systems can be categorized into bidirectional PRE, in which the proxy can transform from Alice to Bob and vice versa, a...

متن کامل

On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification

In 2004, Tzeng, Yang and Hwang proposed a nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. However, Bao, Cao and Wang pointed out that Tzeng et al.’s scheme cannot resist frame attacks and therefore presented an improved version. In this paper, we will show that there is another security flaw existing in both Tzeng et al.’s scheme and Bao et al.’s scheme.

متن کامل

ID-based Proxy Re-signature with Aggregate Property

Recently, Garg et al. proposed an approximate candidate of leveled multi-linear map that can be used for unrestricted aggregation. In this work, we explore building construction of ID-based proxy re-signature with aggregate property, which has many applications. Our construction utilizes the full domain hash structure from multi-linear map proposed by Hohenburger et al. In particular, Hohenburg...

متن کامل

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2009