The proxy signature schemes allow proxy signers to sign messages on behalf of an original signer, a company or an organization. Such schemes have been suggested for use in a number of applications, particularly in distributed computing, where delegation of rights is quite common. Most of proxy signa
On the security of an identity based multi-proxy signature scheme
β Scribed by Hu Xiong; Jianbin Hu; Zhong Chen; Fagen Li
- Publisher
- Elsevier Science
- Year
- 2011
- Tongue
- English
- Weight
- 208 KB
- Volume
- 37
- Category
- Article
- ISSN
- 0045-7906
No coin nor oath required. For personal study only.
β¦ Synopsis
In a multi-proxy signature scheme, an original signer could authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signatures on behalf of the original signer. Recently, Cao and Cao gave the first formal definition and security model of an identity-based multi-proxy signature scheme, then proposed an identity-based multi-proxy signature scheme from bilinear pairings and proved its security in their security model. Although they proved that their scheme is secure under this model, we disprove their claim and show that their scheme is not secure. We also present a simple fix to prevent this attack.
π SIMILAR VOLUMES
In this paper, we show that the identity-based society oriented signature scheme with anonymous signers proposed by Saeednia is insecure. If some members of a given group leave that group or if some new members join the group, their secret keys would be revealed. We also propose a simple way to fulf
Recently, Yu et al. proposed the first identity-based signcryption scheme without random oracles and proved it was semantically secure in the standard model. However, in this paper we find that their scheme actually does not reach the semantic security as they claimed. To make up for this defect, we
Recently, Kang et al. proposed a new identity-based strong designated verifier signature scheme (ID-SDVS) and identity-based designated verifier proxy signature scheme (ID-DVPS). They claimed that their schemes are unforgeable. However, we found out that their schemes are universally forgeable in th
Bhargava and F. Garvan provided the first proof to an identity of Ramanujan. Their proof, which is based on various modular identities, is quite difficult and complicated. In this paper, we give a much simpler proof of this identity by converting it into an identity involving the classical elliptic