Advanced Search
Volume 31 Issue 2
Dec.  2010
Turn off MathJax
Article Contents
Wang Tian-yin, Liu Mai-xue, Wen Qiao-yan. Cryptanalysis of Three Blind Proxy Multi-signature Schemes[J]. Journal of Electronics & Information Technology, 2009, 31(2): 493-496. doi: 10.3724/SP.J.1146.2007.01338
Citation: Wang Tian-yin, Liu Mai-xue, Wen Qiao-yan. Cryptanalysis of Three Blind Proxy Multi-signature Schemes[J]. Journal of Electronics & Information Technology, 2009, 31(2): 493-496. doi: 10.3724/SP.J.1146.2007.01338

Cryptanalysis of Three Blind Proxy Multi-signature Schemes

doi: 10.3724/SP.J.1146.2007.01338
  • Received Date: 2007-08-17
  • Rev Recd Date: 2008-01-14
  • Publish Date: 2009-02-19
  • Through the cryptanalysis of three blind proxy multi-signature schemes, it shows that in Li Yuan et al.s scheme, any original signer can sign a valid blind proxy multi-signature by the means of forging proxy key, and in Kang Li et al.s first type blind proxy multi-signature scheme, attacker not only can forge any proxy signers proxy sub-key, but also can forge blind proxy multi-signatures on any message, and in Kang Li et al.s second type blind proxy multi-signature scheme, attacker can sign a valid blind proxy multi-signature by the means of forging proxy key, therefore the three schemes are not secure.
  • loading
  • Mambo M, Usuda K, and Okmoto E. Proxy signatures:Delegation of the power to sign messages [J]. IEICE Trans. onFundamentals of Electronic Communications and ComputerSciences, 1996, E79-A(9): 1338-1354.[2]谷利则, 张胜, 杨义先. 一种新型的代理签名方案[J].电子与信息学报.2005, 27(9):1463-1466浏览[3]Hsu C L, Tsai K Y, and Tsai P L. Cryptanalysis andimprovement of nonrepudiable threshold multi-proxy multisignaturescheme [J]. Journal of Systems and Software, 2007,177(2): 543-549.[4]Lu E J L, Hwang M S, and Huang C J. A new proxy signaturescheme with revocation [J].Applied Mathematics andComputation.2005, 161(3):799-806[5]伊丽江. 代理签名体制及应用研究[D]. [博士论文], 西安电子科技大学, 2000.Yi Li-jiang. Study on proxy signature schemes and theirapplications [D]. Xidian University, 2000.[6]李媛, 尹为民. 一种具有双重性质的盲代理签名[J]. 计算机应用研究, 2003, 20(11): 16-19.Li Yuan and Yin Wei-min. A kind of blind proxy signaturewith dual property [J]. Application Research of Computers,2003, 20(11): 16-19. ..[7]康莉, 蔡勉, 王亚军. 基于Nyberg-Rueppel 签名体制的盲代理多重签名[J]. 通信学报, 2007, 28(3): 116-119.Kang Li, Cai Mian, and Wang Ya-jun. Blind proxy multisignatureschemes based on Nyberg-Rueppel signaturescheme[J]. Journal on Communications, 2007, 28(3): 116-119.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2940) PDF downloads(591) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return