Paper Title:
Attacks on Self-Certified Multi-Proxy Signature Schemes with Message Recovery
  Abstract

Signature schemes with message recovery based on self-certified public keys can reduce the amount of communications and computations, since the signature verification, the public key authentication and the message recovery are simultaneously carried out in a single logical step. Integrating self-certified public-key systems and the message recovery signature schemes, in 2009, Wu et al. proposed two multi-proxy signatures based on the discrete logarithms over a finite field and the elliptic curve discrete logarithms. The proxy warrant revision attacks are proposed, and it will show that Wu et al.’s schemes can not resist the proxy warrant revision attacks by either the proxy group or the original signer.

  Info
Periodical
Chapter
Chapter 3: Advanced Intelligence & Manufacturing
Edited by
Robin G. Qiu and Yongfeng Ju
Pages
316-320
DOI
10.4028/www.scientific.net/AMM.135-136.316
Citation
Q. Xie, "Attacks on Self-Certified Multi-Proxy Signature Schemes with Message Recovery", Applied Mechanics and Materials, Vols. 135-136, pp. 316-320, 2012
Online since
October 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Xuan Wu Zhou
Abstract:In the paper, we analyzed optimization algorithms for proxy signature and presented an optimized proxy signature scheme based on discrete...
518
Authors: Jun Zhang
Abstract:Structured multi-signatures is a special multi-signature which multiple signer can sign the same message and it provided co-signers with...
401
Authors: Qi Xie
Abstract:The aim of self proxy is to protect the signer’s permanent secret key. In 2007, Kim and Chang proposed a self proxy signature scheme. In this...
643
Authors: Jian Hong Zhang, Xue Liu, Cheng Lian Liu
Abstract:Multi-authenticated encryption scheme is message transmission scheme, which sends message in a secure and authentic way, and allows a group...
111
Authors: Yong Quan Cai, Fu Lai Cheng
Abstract:The traditional threshold signature scheme is a combination of the digital signature scheme and the secret sharing scheme. Any group of t...
49