Advanced Search
Volume 29 Issue 10
Jan.  2011
Turn off MathJax
Article Contents
Lu Rong-bo, He Da-ke, Wang Chang-ji, Miao Xiang-hua. Cryptanalysis and Improvement of a New Proxy Signature Scheme[J]. Journal of Electronics & Information Technology, 2007, 29(10): 2529-2532. doi: 10.3724/SP.J.1146.2006.00414
Citation: Lu Rong-bo, He Da-ke, Wang Chang-ji, Miao Xiang-hua. Cryptanalysis and Improvement of a New Proxy Signature Scheme[J]. Journal of Electronics & Information Technology, 2007, 29(10): 2529-2532. doi: 10.3724/SP.J.1146.2006.00414

Cryptanalysis and Improvement of a New Proxy Signature Scheme

doi: 10.3724/SP.J.1146.2006.00414
  • Received Date: 2006-04-03
  • Rev Recd Date: 2006-09-18
  • Publish Date: 2007-10-19
  • The proxy signature with proxy signer privacy protection without a trusted third party put forward by Gu-Zhang-yang(2005), does not posses the strong unforgeability property because of not being able to avoid the suspending-factor. With this scheme, the original signer can forge a valid proxy signature and pass the procedure of verification and revelation, therefore he or she can successfully prove it is signed by a legal proxy signer. To avoid this shortcoming, an improvement of a proxy signature scheme with proxy signer privacy protection is proposed based on the analysis of the Gu-Zhang-yangs scheme.
  • loading
  • 曹正军,刘木兰. 数字签名方案中的孤悬因子和冗余数据.计算机学报,2006, 29(2): 249-255.[2]Mambo M, Usuda K, and Okamoto E. Proxy signature: Delegation of the power to sign messages. IEICE Trans. on Fundamentals of Electronics Communications and Computer Science, 1996, E79-A(9): 1338-1354.[3]Zhang K. Threshold proxy signature schemes[J].In: Proc of the 1st Intl Information Security Workshop (ISW97), Berlin: Springer-Verlag.1997, LNCS 1396:191-197st Int' target='_blank'>[4]Lal S and Awasthi A K. Proxy blind signature scheme. Available at http:/eprint.iacr.org/. 2003.[5]Yi Lijiang, Bai Guoqiang, and Xiao Guozhen. Proxy multi-signature scheme[J].Electron. Lett.2000, 36(6):527-528[6]Shum K and Wei V K. A strong proxy signature scheme with proxy signer privacy protection. In: N Shahmehri ed. Proc. of the 11th IEEE Intl Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises(WETICE02). New York: IEEE Press, 2002: 55-56.[7]Sun Hung-Min and Hsieh Bin-Tsan. Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection. In: Proc of the IEEE 37th Annual 2003 international conference on security Technology. Taipei, Taiwan: IEEE Press, 2003: 474-476.[8]王晓明,符方伟. 可撤销匿名性的盲代理签名方案.计算机学报, 2003, 26(1): 51-54.[9]傅晓彤,杨礼珍,肖国镇. 对可撤销匿名性的盲代理签名方案的注记. 计算机学报, 2005, 28(8): 1404-1407.[10]Fu Xiongtong.[J].Kou Weidong, and Xiao Guozhen. A proxy signature scheme with proxy signer privacy anonymity. In: Proc of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business(CEC-East04) New York: IEEE Press.2004,:-[11]谷利泽,张胜,杨义先.一种新型的代理签名方案[J].电子与信息学报.2005, 27(9):1463-1466浏览
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3560) PDF downloads(951) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return