𝔖 Bobbio Scriptorium
✦   LIBER   ✦

On the security of an identity based multi-proxy signature scheme

✍ Scribed by Hu Xiong; Jianbin Hu; Zhong Chen; Fagen Li


Publisher
Elsevier Science
Year
2011
Tongue
English
Weight
208 KB
Volume
37
Category
Article
ISSN
0045-7906

No coin nor oath required. For personal study only.

✦ Synopsis


In a multi-proxy signature scheme, an original signer could authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signatures on behalf of the original signer. Recently, Cao and Cao gave the first formal definition and security model of an identity-based multi-proxy signature scheme, then proposed an identity-based multi-proxy signature scheme from bilinear pairings and proved its security in their security model. Although they proved that their scheme is secure under this model, we disprove their claim and show that their scheme is not secure. We also present a simple fix to prevent this attack.


πŸ“œ SIMILAR VOLUMES


Provably secure proxy-protected signatur
✍ Zuhua Shao πŸ“‚ Article πŸ“… 2009 πŸ› Elsevier Science 🌐 English βš– 210 KB

The proxy signature schemes allow proxy signers to sign messages on behalf of an original signer, a company or an organization. Such schemes have been suggested for use in a number of applications, particularly in distributed computing, where delegation of rights is quite common. Most of proxy signa

Cryptanalysis of β€œan identity-based soci
✍ Zuhua Shao πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 63 KB

In this paper, we show that the identity-based society oriented signature scheme with anonymous signers proposed by Saeednia is insecure. If some members of a given group leave that group or if some new members join the group, their secret keys would be revealed. We also propose a simple way to fulf

An improved semantically-secure identity
✍ Zhengping Jin; Qiaoyan Wen; Hongzhen Du πŸ“‚ Article πŸ“… 2010 πŸ› Elsevier Science 🌐 English βš– 203 KB

Recently, Yu et al. proposed the first identity-based signcryption scheme without random oracles and proved it was semantically secure in the standard model. However, in this paper we find that their scheme actually does not reach the semantic security as they claimed. To make up for this defect, we

Forgery attacks on Kang et al.’s identit
✍ Ji-Seon Lee; Jik Hyun Chang; Dong Hoon Lee πŸ“‚ Article πŸ“… 2010 πŸ› Elsevier Science 🌐 English βš– 199 KB

Recently, Kang et al. proposed a new identity-based strong designated verifier signature scheme (ID-SDVS) and identity-based designated verifier proxy signature scheme (ID-DVPS). They claimed that their schemes are unforgeable. However, we found out that their schemes are universally forgeable in th

On an Identity of Ramanujan Based on The
✍ Li-Chien Shen πŸ“‚ Article πŸ“… 1998 πŸ› Elsevier Science 🌐 English βš– 205 KB

Bhargava and F. Garvan provided the first proof to an identity of Ramanujan. Their proof, which is based on various modular identities, is quite difficult and complicated. In this paper, we give a much simpler proof of this identity by converting it into an identity involving the classical elliptic