http://iet.metastore.ingenta.com
1887

On the security of an identity-based proxy multi-signature scheme

On the security of an identity-based proxy multi-signature scheme

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In 2000, Yi et al. proposed two proxy multi-signature schemes which enable two or more original signers to delegate their signing power to a proxy signer. Combining proxy multi-signature with identity-based cryptography, Wang et al. proposed an identity-based proxy multi-signature scheme in 2007. Their scheme is claimed to be secure in the random oracle model. However, in this study, the author shows that Wang et al.'s scheme is vulnerable to a forgery attack described in this study.

References

    1. 1)
      • Mambo, M., Usuda, K., Okamoto, E.: `Proxy signatures for delegating signing operation', Proc. Third ACM Conf. on Computer and Communications Security, 1996, p. 48–57.
    2. 2)
      • Lee, B., Kim, H., Kim, K.: `Strong proxy signature and its applications', Proc. ICICS'97, Int. Conf. on Information and Communication Security, 2001, p. 603–608.
    3. 3)
      • Kim, S., Park, S., Won, D.: `Proxy signature, revisited', Proc. SCIS2001, Int. Conf. on Information and Communication Security, 1997, p. 223–232.
    4. 4)
      • C.L. Hsu , T.S. Wu , T.C. Wu . New nonrepudiable threshold proxy signature scheme with known signers. J. Syst. Software , 119 - 124
    5. 5)
      • L. Yi , G. Bai , G. Xiao . Proxy multi-signature scheme: a new type of proxy signature scheme. Electron. Lett. , 6 , 527 - 528
    6. 6)
      • Q. Wang , Z.F. Cao . Identity based proxy multi-signature. J. Syst. Softw. , 1023 - 1029
    7. 7)
      • Gentry, C., Ramzan, Z.: `Identity based aggregate signatures', PKC2006, 2006, p. 257–273, (LNCS, 3958).
    8. 8)
      • L. Fagen , Z. Shijie , S. Rong . Cryptanalysis of an identity based proxy multi-signature scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. , 7 , 1820 - 1823
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2009.0033
Loading

Related content

content/journals/10.1049/iet-ifs.2009.0033
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address