Skip to main content
placeholder image

Strong Identity-Based Proxy Signature Schemes, Revisited

Journal Article


Download full-text (Open Access)

Abstract


  • Proxy signature is a useful cryptographic primitive that has been widely used in many applications. It has attracted a lot of attention since it was introduced. There have been lots of works in constructing efficient and secure proxy signature schemes. In this paper, we identify a new attack that has been neglected by many existing proven secure proxy signature schemes. We demonstrate this attack by launching it against an identity-based proxy signature scheme which is proven secure. We then propose one method that can effectively prevent this attack. The weakness in some other proxy signature schemes can also be fixed by applying the same method.

Authors


  •   Liu, Weiwei (external author)
  •   Mu, Yi (external author)
  •   Yang, Guomin
  •   Tian, Yangguang (external author)

Publication Date


  • 2018

Citation


  • Liu, W., Mu, Y., Yang, G. & Tian, Y. (2018). Strong Identity-Based Proxy Signature Schemes, Revisited. Wireless Communications and Mobile Computing, 2018 6925019-1-6925019-12.

Scopus Eid


  • 2-s2.0-85053031291

Ro Full-text Url


  • https://ro.uow.edu.au/cgi/viewcontent.cgi?article=3172&context=eispapers1

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers1/2166

Start Page


  • 6925019-1

End Page


  • 6925019-12

Volume


  • 2018

Place Of Publication


  • United Kingdom

Abstract


  • Proxy signature is a useful cryptographic primitive that has been widely used in many applications. It has attracted a lot of attention since it was introduced. There have been lots of works in constructing efficient and secure proxy signature schemes. In this paper, we identify a new attack that has been neglected by many existing proven secure proxy signature schemes. We demonstrate this attack by launching it against an identity-based proxy signature scheme which is proven secure. We then propose one method that can effectively prevent this attack. The weakness in some other proxy signature schemes can also be fixed by applying the same method.

Authors


  •   Liu, Weiwei (external author)
  •   Mu, Yi (external author)
  •   Yang, Guomin
  •   Tian, Yangguang (external author)

Publication Date


  • 2018

Citation


  • Liu, W., Mu, Y., Yang, G. & Tian, Y. (2018). Strong Identity-Based Proxy Signature Schemes, Revisited. Wireless Communications and Mobile Computing, 2018 6925019-1-6925019-12.

Scopus Eid


  • 2-s2.0-85053031291

Ro Full-text Url


  • https://ro.uow.edu.au/cgi/viewcontent.cgi?article=3172&context=eispapers1

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers1/2166

Start Page


  • 6925019-1

End Page


  • 6925019-12

Volume


  • 2018

Place Of Publication


  • United Kingdom