Security Analysis of Some Proxy Signature

A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of...

Full description

Saved in:
Bibliographic Details
Main Authors: WANG, Guilin, BAO, Feng, ZHOU, Jianying, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2004
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1075
https://ink.library.smu.edu.sg/context/sis_research/article/2074/viewcontent/SecurityAnalysis_ProxySignature_2004_afv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2074
record_format dspace
spelling sg-smu-ink.sis_research-20742019-01-04T05:32:55Z Security Analysis of Some Proxy Signature WANG, Guilin BAO, Feng ZHOU, Jianying DENG, Robert H. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite common. Followed by the first schemes introduced by Mambo, Usuda and Okamoto in 1996, a number of new schemes and improvements have been proposed. In this paper, we present a security analysis of four such schemes newly proposed. By successfully identifying several interesting forgery attacks, we show that these four schemes all are insecure. Consequently, the fully distributed proxy scheme is also insecure since it is based on the (insecure) LKK scheme. In addition, we point out the reasons why the security proofs provided are invalid. 2004-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1075 info:doi/10.1007/978-3-540-24691-6_23 https://ink.library.smu.edu.sg/context/sis_research/article/2074/viewcontent/SecurityAnalysis_ProxySignature_2004_afv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Digital signatures proxy signatures security analysis Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Digital signatures
proxy signatures
security analysis
Information Security
spellingShingle Digital signatures
proxy signatures
security analysis
Information Security
WANG, Guilin
BAO, Feng
ZHOU, Jianying
DENG, Robert H.
Security Analysis of Some Proxy Signature
description A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite common. Followed by the first schemes introduced by Mambo, Usuda and Okamoto in 1996, a number of new schemes and improvements have been proposed. In this paper, we present a security analysis of four such schemes newly proposed. By successfully identifying several interesting forgery attacks, we show that these four schemes all are insecure. Consequently, the fully distributed proxy scheme is also insecure since it is based on the (insecure) LKK scheme. In addition, we point out the reasons why the security proofs provided are invalid.
format text
author WANG, Guilin
BAO, Feng
ZHOU, Jianying
DENG, Robert H.
author_facet WANG, Guilin
BAO, Feng
ZHOU, Jianying
DENG, Robert H.
author_sort WANG, Guilin
title Security Analysis of Some Proxy Signature
title_short Security Analysis of Some Proxy Signature
title_full Security Analysis of Some Proxy Signature
title_fullStr Security Analysis of Some Proxy Signature
title_full_unstemmed Security Analysis of Some Proxy Signature
title_sort security analysis of some proxy signature
publisher Institutional Knowledge at Singapore Management University
publishDate 2004
url https://ink.library.smu.edu.sg/sis_research/1075
https://ink.library.smu.edu.sg/context/sis_research/article/2074/viewcontent/SecurityAnalysis_ProxySignature_2004_afv.pdf
_version_ 1770570847414648832