Sciweavers

Share
ICISC
2003

Security Analysis of Some Proxy Signatures

9 years 10 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite common. Followed by the first schemes introduced by Mambo, Usuda and Okamoto in 1996, a number of new schemes and improvements have been proposed. In this paper, we present a security analysis of four such schemes newly proposed in [15, 16]. By successfully identifying several interesting forgery attacks, we show that all the four schemes are insecure. Consequently, the fully distributed proxy scheme in [11] is also insecure since it is based on the (insecure) LKK scheme [14, 15]. In addition, we point out the reasons why the security proofs provided in [15] are invalid.
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De
Added 31 Oct 2010
Updated 31 Oct 2010
Type Conference
Year 2003
Where ICISC
Authors Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Comments (0)
books