Abstract | ||
---|---|---|
As a kind of digital signatures, proxy signature has generally been paid more attentions. It is useful when one needs to delegate his signing capability to other party. Recently, Sun et al. proposed a proxy multi-signature scheme without random oracles and Liu et al. proposed a multi-proxy signature scheme with proxy revocation. Both of the two schemes are proved to be existentially unforgeable in the standard model. In this paper, we show that Sun et al.'s scheme is vulnerable to insider attack. That is, a dishonest proxy signer can reconstruct a new warrant and generate forged proxy signatures on any illegal messages which are not delegated by the original signers. In addition, we disprove Liu et al.'s security claims and show that a successful universal forgery is feasible of the scheme. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/iThings/CPSCom.2011.85 | iThings/CPSCom |
Keywords | Field | DocType |
proxy multisignature scheme,universal forgery,forgery attacks,pairing-based proxy signature schemes,forged proxy signatures,proxy signature,forgery attack,proxy multi-signature scheme,insider attack,multi-proxy signature,dishonest proxy signer,illegal messages,digital signatures,new warrant,proxy multi-signature,digital signature,multi-proxy signature scheme,bilinear pairing,illegal message,existentially unforgeable,proxy revocation,random oracle,internet,standard model | Proxy signature,Proxy (climate),Warrant,Computer science,Delegate,Computer security,Insider attack,Pairing,Revocation,Digital signature | Conference |
ISBN | Citations | PageRank |
978-1-4577-1976-9 | 0 | 0.34 |
References | Authors | |
6 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chan Wang | 1 | 0 | 0.68 |
Xiao-Tong Fu | 2 | 10 | 3.46 |