Abstract | ||
---|---|---|
By analyzing the ID-based proxy signature scheme without trusted PKG proposed by Xu, the paper proves that the scheme is not security because it cannot withstand the attack which the original signer can tamper with the proxy warrant allayed with PKG. So the scheme is improved. In the paper, the improved scheme is proved that it is a security and effectual scheme. And the improved scheme overcomes the security vulnerability of Xu's scheme without increasing the computing cost. The improved scheme is more safe to be suit for being applied into e-cash and e-voting. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/SNPD.2015.7176196 | 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) |
Keywords | Field | DocType |
ID-based,proxy signature,security analysis,Private Key Generator(PKG),warrant | Proxy signature,Electronic voting,Digital signatures cryptography,Vulnerability (computing),Computer science,Computer security,Digital signature,Security analysis,Public-key cryptography | Conference |
Citations | PageRank | References |
0 | 0.34 | 5 |
Authors | ||
1 |