TY - GEN
T1 - Security weaknesses in two proxy signature schemes
AU - Lu, J.
PY - 2006
Y1 - 2006
N2 - Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature should satisfy the property of strong unforgeability: anyone except the designated proxy signer cannot create a valid proxy signature on behalf of the original signer. Since proxy signatures, as well as their derivatives, can be used in many applications in reality, such as secure mobile agent, e-commerce systems and etc., they have been receiving extensive research recently. In this paper, we show that the proxy signature scheme [14] from ISPA’04 will suffer from the original signer’s forgery attack if the original signer once gets a valid proxy signature on a message, and a similar attack arises in the proxy signature scheme [1] from AWCC’04 if the verifier does not check the originality of the proxy signer’s proxy public key before verifying a proxy signature. Therefore, in some degree, neither of these two schemes meets the property of strong unforgeability.
AB - Allowing a proxy signer to generate a signature on behalf of an original signer, a proxy signature should satisfy the property of strong unforgeability: anyone except the designated proxy signer cannot create a valid proxy signature on behalf of the original signer. Since proxy signatures, as well as their derivatives, can be used in many applications in reality, such as secure mobile agent, e-commerce systems and etc., they have been receiving extensive research recently. In this paper, we show that the proxy signature scheme [14] from ISPA’04 will suffer from the original signer’s forgery attack if the original signer once gets a valid proxy signature on a message, and a similar attack arises in the proxy signature scheme [1] from AWCC’04 if the verifier does not check the originality of the proxy signer’s proxy public key before verifying a proxy signature. Therefore, in some degree, neither of these two schemes meets the property of strong unforgeability.
U2 - 10.1007/11751595_50
DO - 10.1007/11751595_50
M3 - Conference contribution
SN - 3-540-34075-0
SN - 978-3-540-34075-1
T3 - Lecture Notes in Computer Science (LNCS)
SP - 466
EP - 475
BT - Computational Science and Its Applications - ICCSA 2006
A2 - Gavrilova, M.L.
A2 - Gervasi, O.
A2 - Kumar, V.
A2 - Tan, C.J.K.
A2 - Taniar, D.
A2 - Laganà, A.
A2 - Mun, Y.
A2 - Choo, H.
PB - Springer
CY - Berlin
ER -