Comment on Lee J-s et al.'s Identity-Based Designated Verifer Proxy Signature Scheme and its Improvement

Article Preview

Abstract:

In a designated verifier proxy signature scheme, one can delegate his or her signing capability to another user in such a way that the latter can sign messages on behalf of the former, but the validity of the resulting signatures can only be verified by the designated verifier. Recently, Lee J-s et al. proposed a new ID-Based designated verifier proxy signature scheme. They didn't analysis the security of their scheme. We found out that anyone can generate a valid signature on any message m and mw he choose. To overcome this flaw in Lee J-s et al.'s scheme, we formalized the notion of designated verifier proxy signature scheme, provide a new ID-Based designated verifier proxy signature scheme. We also analyzed the proposed scheme.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 143-144)

Pages:

753-757

Citation:

Online since:

October 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. Shamir, Identity-based cryptosystems and signature schemes, in G.R. Blakley, D. Chaum (Eds. ), Proceedings of the Crypto'84, LNCS, vol. 196, Springer-Verlag, 1984, pp.47-53.

Google Scholar

[2] M. Mambo, K. Usuda, E. Okamoto, Proxy signatures: delegation of the power to sign messages, IEICE Transactions on Fundamentals of Electronic Communications and Computer Science E79-A (9) (1996) pp.1338-1354.

Google Scholar

[3] H. Huanga, C. Chang. A novel efficient (t, n) threshold proxy signature scheme. Information Sciences 176 (10) (2006) pp.1338-1349.

DOI: 10.1016/j.ins.2005.02.010

Google Scholar

[4] A.K. Awasthi, S. Lal, Proxy blind signature scheme, Transaction on Cryptology 2 (1) (2005) pp.5-11.

Google Scholar

[5] X. Fu, L. Yi, G. Xiao, A new type of proxy multi-signature schemes, Journal of Xidian University 28 (6) (2001) pp.729-731.

Google Scholar

[6] M. Jakobsson, K. Sako, R. Impagliazzo, Designated verifier proofs and their applications, Advances in Cryptology-EUROCRYPT '96, Lecture Notes in Computer Science, vol. 1070, Springer, Berlin, 1996, pp.143-154.

DOI: 10.1007/3-540-68339-9_13

Google Scholar

[7] Lee J-s et al. Forgery attacks on Kang et al. 's identity-based strong designated verifier signature scheme and its improvement with security proof. Compute Electr Eng(2010), doi: 10. 1016/j . compeleceng 2010. 02. 001.

DOI: 10.1016/j.compeleceng.2010.02.001

Google Scholar