Security weaknesses in two proxy signature schemes

  • J. Lu

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Abstract

    Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature should satisfy the property of strong unforgeability: anyone except the designated proxy signer cannot create a valid proxy signature on behalf of the original signer. Since proxy signatures, as well as their derivatives, can be used in many applications in reality, such as secure mobile agent, e-commerce systems and etc., they have been receiving extensive research recently. In this paper, we show that the proxy signature scheme [14] from ISPA’04 will suffer from the original signer’s forgery attack if the original signer once gets a valid proxy signature on a message, and a similar attack arises in the proxy signature scheme [1] from AWCC’04 if the verifier does not check the originality of the proxy signer’s proxy public key before verifying a proxy signature. Therefore, in some degree, neither of these two schemes meets the property of strong unforgeability.
    Original languageEnglish
    Title of host publicationComputational Science and Its Applications - ICCSA 2006
    Subtitle of host publicationInternational Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III
    EditorsM.L. Gavrilova, O. Gervasi, V. Kumar, C.J.K. Tan, D. Taniar, A. Laganà, Y. Mun, H. Choo
    Place of PublicationBerlin
    PublisherSpringer
    Chapter50
    Pages466-475
    Number of pages10
    ISBN (Electronic)978-3-540-34076-8
    ISBN (Print)3-540-34075-0, 978-3-540-34075-1
    DOIs
    Publication statusPublished - 2006

    Publication series

    NameLecture Notes in Computer Science (LNCS)
    Volume3982
    ISSN (Print)0302-9743

    Fingerprint

    Dive into the research topics of 'Security weaknesses in two proxy signature schemes'. Together they form a unique fingerprint.

    Cite this