Lu Rong-bo, He Da-ke, Wang Chang-ji, Miao Xiang-hua. Cryptanalysis and Improvement of a New Proxy Signature Scheme[J]. Journal of Electronics & Information Technology, 2007, 29(10): 2529-2532. doi: 10.3724/SP.J.1146.2006.00414
Citation:
Lu Rong-bo, He Da-ke, Wang Chang-ji, Miao Xiang-hua. Cryptanalysis and Improvement of a New Proxy Signature Scheme[J]. Journal of Electronics & Information Technology, 2007, 29(10): 2529-2532. doi: 10.3724/SP.J.1146.2006.00414
Lu Rong-bo, He Da-ke, Wang Chang-ji, Miao Xiang-hua. Cryptanalysis and Improvement of a New Proxy Signature Scheme[J]. Journal of Electronics & Information Technology, 2007, 29(10): 2529-2532. doi: 10.3724/SP.J.1146.2006.00414
Citation:
Lu Rong-bo, He Da-ke, Wang Chang-ji, Miao Xiang-hua. Cryptanalysis and Improvement of a New Proxy Signature Scheme[J]. Journal of Electronics & Information Technology, 2007, 29(10): 2529-2532. doi: 10.3724/SP.J.1146.2006.00414
The proxy signature with proxy signer privacy protection without a trusted third party put forward by Gu-Zhang-yang(2005), does not posses the strong unforgeability property because of not being able to avoid the suspending-factor. With this scheme, the original signer can forge a valid proxy signature and pass the procedure of verification and revelation, therefore he or she can successfully prove it is signed by a legal proxy signer. To avoid this shortcoming, an improvement of a proxy signature scheme with proxy signer privacy protection is proposed based on the analysis of the Gu-Zhang-yangs scheme.
曹正军,刘木兰. 数字签名方案中的孤悬因子和冗余数据.计算机学报,2006, 29(2): 249-255.[2]Mambo M, Usuda K, and Okamoto E. Proxy signature: Delegation of the power to sign messages. IEICE Trans. on Fundamentals of Electronics Communications and Computer Science, 1996, E79-A(9): 1338-1354.[3]Zhang K. Threshold proxy signature schemes[J].In: Proc of the 1st Intl Information Security Workshop (ISW97), Berlin: Springer-Verlag.1997, LNCS 1396:191-197st Int' target='_blank'>[4]Lal S and Awasthi A K. Proxy blind signature scheme. Available at http:/eprint.iacr.org/. 2003.[5]Yi Lijiang, Bai Guoqiang, and Xiao Guozhen. Proxy multi-signature scheme[J].Electron. Lett.2000, 36(6):527-528[6]Shum K and Wei V K. A strong proxy signature scheme with proxy signer privacy protection. In: N Shahmehri ed. Proc. of the 11th IEEE Intl Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises(WETICE02). New York: IEEE Press, 2002: 55-56.[7]Sun Hung-Min and Hsieh Bin-Tsan. Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection. In: Proc of the IEEE 37th Annual 2003 international conference on security Technology. Taipei, Taiwan: IEEE Press, 2003: 474-476.[8]王晓明,符方伟. 可撤销匿名性的盲代理签名方案.计算机学报, 2003, 26(1): 51-54.[9]傅晓彤,杨礼珍,肖国镇. 对可撤销匿名性的盲代理签名方案的注记. 计算机学报, 2005, 28(8): 1404-1407.[10]Fu Xiongtong.[J].Kou Weidong, and Xiao Guozhen. A proxy signature scheme with proxy signer privacy anonymity. In: Proc of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business(CEC-East04) New York: IEEE Press.2004,:-[11]谷利泽,张胜,杨义先.一种新型的代理签名方案[J].电子与信息学报.2005, 27(9):1463-1466浏览