Publication Type
Conference Proceeding Article
Version
publishedVersion
Publication Date
3-2004
Abstract
A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite common. Followed by the first schemes introduced by Mambo, Usuda and Okamoto in 1996, a number of new schemes and improvements have been proposed. In this paper, we present a security analysis of four such schemes newly proposed. By successfully identifying several interesting forgery attacks, we show that these four schemes all are insecure. Consequently, the fully distributed proxy scheme is also insecure since it is based on the (insecure) LKK scheme. In addition, we point out the reasons why the security proofs provided are invalid.
Keywords
Digital signatures, proxy signatures, security analysis
Discipline
Information Security
Research Areas
Cybersecurity
Publication
Information Security and Cryptology - ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28: Revised Papers
Volume
2971
First Page
305
Last Page
319
ISBN
9783540246916
Identifier
10.1007/978-3-540-24691-6_23
Publisher
Springer
City or Country
Berlin
Citation
WANG, Guilin; BAO, Feng; ZHOU, Jianying; and DENG, Robert H..
Security Analysis of Some Proxy Signature. (2004). Information Security and Cryptology - ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28: Revised Papers. 2971, 305-319.
Available at: https://ink.library.smu.edu.sg/sis_research/1075
Copyright Owner and License
Authors
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1007/978-3-540-24691-6_23