Paper Title:
Comment on Lee J-s et al.'s Identity-Based Designated Verifer Proxy Signature Scheme and its Improvement
  Abstract

In a designated verifier proxy signature scheme, one can delegate his or her signing capability to another user in such a way that the latter can sign messages on behalf of the former, but the validity of the resulting signatures can only be verified by the designated verifier. Recently, Lee J-s et al. proposed a new ID-Based designated verifier proxy signature scheme. They didn't analysis the security of their scheme. We found out that anyone can generate a valid signature on any message m and mw he choose. To overcome this flaw in Lee J-s et al.'s scheme, we formalized the notion of designated verifier proxy signature scheme, provide a new ID-Based designated verifier proxy signature scheme. We also analyzed the proposed scheme.

  Info
Periodical
Advanced Materials Research (Volumes 143-144)
Edited by
H. Wang, B.J. Zhang, X.Z. Liu, D.Z. Luo, S.B. Zhong
Pages
753-757
DOI
10.4028/www.scientific.net/AMR.143-144.753
Citation
D. J. Liao, Y. S. Tang, "Comment on Lee J-s et al.'s Identity-Based Designated Verifer Proxy Signature Scheme and its Improvement", Advanced Materials Research, Vols. 143-144, pp. 753-757, 2011
Online since
October 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Si Lian Xie, Tie Bin Wu, Shui Ping Wu, Yun Lian Liu
Chapter 18: Computer Applications in Industry and Engineering
Abstract:Evolutionary algorithms are amongst the best known methods of solving difficult constrained optimization problems, for which traditional...
2846
Authors: Jia Liu, Yu Li Shen
Chapter 6: Communication and Network
Abstract:In this paper, a wireless local area network (WLAN) authentication scheme is proposed to both enhance the security and the working efficiency...
1113
Authors: Lei Chen, Ping Wang, Fu Qiang Liu, Qing Ai, Hui Fang Pang, Yan Chao Li, Hai Lang Cao
Chapter 4: Measurement of the Noise and Vibration
Abstract:Quality of Experience is referred to as an important index for measuring how well the user's requirements are satisfied, and many methods...
415
Authors: Jia Ning Luo, Ming Hour Yang
Chapter 5: Advanced Development for Information Technologies and Engineering, Networks and Software Applications, Data Acquisition and Processing, Intelligent Systems
Abstract:In this paper, we propose an anonymous NFC-based payment protocol (ANP) using NFC phones in a mobile payment framework. Our protocol is...
812
Authors: Shu Lan Wang, Jian Ping Yu, Peng Zhang, Ping Wang
Chapter 6: Computer Science, Networks, Communication, Software, Information Security and Technologies
Abstract:Attribute-based encryption (ABE) can keep data privacy and realize fine-grained access control. However, the notion of file hierarchy hasn't...
911