Security weaknesses in two proxy signature schemes

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature should satisfy the property of strong unforgeability: anyone except the designated proxy signer cannot create a valid proxy signature on behalf of the original signer. Since proxy signatures, as well as their derivatives, can be used in many applications in reality, such as secure mobile agent, e-commerce systems and etc., they have been receiving extensive research recently. In this paper, we show that the proxy signature scheme [14] from ISPA'04 will suffer from the original signer's forgery attack if the original signer once gets a valid proxy signature on a message, and a similar attack arises in the proxy signature scheme [1] from AWCC'04 if the verifier does not check the originality of the proxy signer's proxy public key before verifying a proxy signature. Therefore, in some degree, neither of these two schemes meets the property of strong unforgeability. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Lu, J. (2006). Security weaknesses in two proxy signature schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3982 LNCS, pp. 466–475). Springer Verlag. https://doi.org/10.1007/11751595_50

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free