Advanced Search
Volume 31 Issue 5
Dec.  2010
Turn off MathJax
Article Contents
Yu Yong, Xu Chun-xiang, Zhou Min, Li Fa-gen. Cryptanalysis of Two Nominative Proxy Signature Schemes[J]. Journal of Electronics & Information Technology, 2009, 31(5): 1218-1220. doi: 10.3724/SP.J.1146.2008.00179
Citation: Yu Yong, Xu Chun-xiang, Zhou Min, Li Fa-gen. Cryptanalysis of Two Nominative Proxy Signature Schemes[J]. Journal of Electronics & Information Technology, 2009, 31(5): 1218-1220. doi: 10.3724/SP.J.1146.2008.00179

Cryptanalysis of Two Nominative Proxy Signature Schemes

doi: 10.3724/SP.J.1146.2008.00179
  • Received Date: 2008-02-01
  • Rev Recd Date: 2008-06-25
  • Publish Date: 2009-05-19
  • Analyses of two nominative proxy signature schemes proposed by Seo et al.(2003) and Huang et al. (2004) are given in this paper. The results show that neither the scheme has the property of strong unforgeability. A forgery attack on the two schemes is given, respectively. Using the forgery attack, a dishonest original signer can forge a proxy signing key on behalf of the designated proxy signer by assigning some parameters and produce valid nominative proxy signatures, which does harm to the benefits of the proxy signers.
  • loading
  • Kim S J.[J].Park S J, and Won D H. Nominative signatures.Proc. of ICEIC95, International Conference on Electronics,Information and Communications, Yanji, Jilin, China,August.1995,:-[2]Kim S J.[J].Park S J, and Won D H. Zero-knowledge nominativesignatures. Proc. of PragoCrypt96, International Conferenceon the Theory and Applications of Cryptology, Prague, Czech,September.1996,:-[3]Huang Z and Wang Y. Convertible nominative signatures.Proc. of Information Security and Privacy, ACISP 2004,Berlin: Springer-Verlag, 2004, LNCS 3108: 348-357.[4]Susilo W and Mu Y. On the security of nominative signatures.Proc. of Information Security and Privacy, ACISP 2005,Berlin: Springer-Verlag, 2005, LNCS 3574: 329-335.[5]Wang G and Bao F. Security remarks on a convertiblenominative signature scheme. Proc. of IFIP InternationalFederation for Information Processing, New Approaches forSecurity, Privacy and Trust in Complex Environments,Boston: Springer, 2007, Vol. 232: 265-275.[6]Liu D Y, Wong D S, and Huang X, et al.. Formal definitionand construction of nominative signature. Proc. of ICICS2007, Berlin: Springer-Verlag, 2007, LNCS 4861: 57-68.[7]Liu D Y, Chang S, and Wong D S, et al.. Nominativesignature from ring signature. Proc. of IWSEC 2007, Berlin:Springer-Verlag, 2007, LNCS 4752: 396-411.[8]Park H U and Lee I Y. A digital nominative proxy signaturescheme for mobile communication. Proc. of ICICS 2001,Berlin: Springer-Verlag, 2001, LNCS 2229: 451-455.[9]Seo S H and Lee S H. New nominative proxy signaturescheme for mobile communication. Proc. of SPI2003,Security and Protection of Information, Brno, CZ, 2003:149-154.[10]黄振杰, 郝艳华, 王育民. 指明签名与指明代理签名[J].电子与信息学报.2004, 26(12):1996-2001浏览
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3083) PDF downloads(815) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return