Cryptanalysis and Improvement of a Strong Designated-Verifier Proxy Signature Scheme

Article Preview

Abstract:

By cryptanalysis of a strong designated-verifier proxy signature scheme, it is found that this scheme has security leaks: original signer can forge the proxy signers valid proxy signature for any message; not only the designated-verifier but also proxy signer can verify the signature and proxy signer can misuse it. An improvement is given, and the security analysis shows that it can resist the spiteful forgery attacks by original signer and prevent the misuse of proxy signature by proxy signer.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1999-2003

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages. EICE Trans. Fundamentals, 1996, E79-A9: 1338-1353.

Google Scholar

[2] Jakobsson M, Sako K, Impagliazzo R. Designated verifier proofs and their applications[C]. Proceedings of Eurocrypt 1996. Lecture Notes in Computer Science 1070, Berlin: Springer-Verlag, 1996, 143-154.

DOI: 10.1007/3-540-68339-9_13

Google Scholar

[3] Ji-Seon Lee, Jik Hyun Chang. Designated Confirmer Proxy Signature Scheme[C]. ICACT2007: 137-140.

Google Scholar

[4] Saeednia S, Kramer S, Markovitch O. An efficient strong designated verifier signature scheme[C]∥Inf-ormation Security and Cryptology. Berlin: Springere-rlag, 2003: 143-154.

DOI: 10.1007/978-3-540-24691-6_4

Google Scholar

[5] Lipmaa H, Wang Guilin, Bao Feng. Designated verifier signatureschemes: attacks. new security notions and a new construction. In: Proc of the 32 nd InternationalColloquium on Automata, Languagesand Programming(ICALP2005), LNCS3580, Springer-Verlag, 2005: 459-471.

DOI: 10.1007/11523468_38

Google Scholar

[6] YangBo, XiaoZibi, YangYixian, etc. Strong Multi-Designated Verifiers Signature Scheme [J]. JournalofBei jingUniversit yofPostsandTelecommunications, 2007, 30(5): 1-4.

Google Scholar

[7] Yaling Zhang,Jing Zhang,Yikun Zhang. Multi-sign-ers Strong Designated Verifier Signature Scheme[C]. Ninth ACIS International Conference on Software Eng-ineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing: 2008, 324-328.

DOI: 10.1109/snpd.2008.68

Google Scholar

[8] Jianhong Zhang, Qin Geng. Efficient Provably Secure Designated Verifier Signature Scheme without Random Oracle[C]. 2009 International Conference on Networks Security, Wireless Communications and Trusted Compu-ting: 2009, 29-33.

DOI: 10.1109/nswctc.2009.402

Google Scholar

[9] Zhang Bo, Xu Qiuliang. a Strong Designated verif-ier Proxy Signature scheme[C]. Second International Workshop on Knowledge Discovery and Date Mining: 2009, 569-572.

DOI: 10.1109/wkdd.2009.65

Google Scholar