Strong identity-based proxy signature schemes, revisited

Proxy signature is a useful cryptographic primitive that has been widely used in many applications. It has attracted a lot of attention since it was introduced. There have been lots of works in constructing efficient and secure proxy signature schemes. In this paper, we identify a new attack that ha...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلفون الرئيسيون: LIU, Weiwei, MU, Yi, YANG, Guomin, TIAN, Yangguang
التنسيق: text
اللغة:English
منشور في: Institutional Knowledge at Singapore Management University 2018
الموضوعات:
الوصول للمادة أونلاين:https://ink.library.smu.edu.sg/sis_research/5308
https://ink.library.smu.edu.sg/context/sis_research/article/6311/viewcontent/Strong_Identity_Proxy_Sign_Revisited_pvoa.pdf
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
الوصف
الملخص:Proxy signature is a useful cryptographic primitive that has been widely used in many applications. It has attracted a lot of attention since it was introduced. There have been lots of works in constructing efficient and secure proxy signature schemes. In this paper, we identify a new attack that has been neglected by many existing proven secure proxy signature schemes. We demonstrate this attack by launching it against an identity-based proxy signature scheme which is proven secure. We then propose one method that can effectively prevent this attack. The weakness in some other proxy signature schemes can also be fixed by applying the same method.