Strong Identity-Based Proxy Signature Schemes, Revisited

Proxy signature is a useful cryptographic primitive that has been widely used in many applications. It has attracted a lot of attention since it was introduced. There have been lots of works in constructing efficient and secure proxy signature schemes. In this paper, we identify a new attack that ha...

Full description

Bibliographic Details
Main Authors: Weiwei Liu, Yi Mu, Guomin Yang, Yangguang Tian
Format: Article
Language:English
Published: Hindawi-Wiley 2018-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2018/6925019
id doaj-060ad7451c904a2a8609973a377077de
record_format Article
spelling doaj-060ad7451c904a2a8609973a377077de2020-11-24T21:58:19ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772018-01-01201810.1155/2018/69250196925019Strong Identity-Based Proxy Signature Schemes, RevisitedWeiwei Liu0Yi Mu1Guomin Yang2Yangguang Tian3School of Mathematics and Statistics, North China University of Water Resources and Electric Power, Zhengzhou 450046, Henan, ChinaInstitute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, NSW 2522, AustraliaInstitute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, NSW 2522, AustraliaSchool of Information Systems, Singapore Management University, SingaporeProxy signature is a useful cryptographic primitive that has been widely used in many applications. It has attracted a lot of attention since it was introduced. There have been lots of works in constructing efficient and secure proxy signature schemes. In this paper, we identify a new attack that has been neglected by many existing proven secure proxy signature schemes. We demonstrate this attack by launching it against an identity-based proxy signature scheme which is proven secure. We then propose one method that can effectively prevent this attack. The weakness in some other proxy signature schemes can also be fixed by applying the same method.http://dx.doi.org/10.1155/2018/6925019
collection DOAJ
language English
format Article
sources DOAJ
author Weiwei Liu
Yi Mu
Guomin Yang
Yangguang Tian
spellingShingle Weiwei Liu
Yi Mu
Guomin Yang
Yangguang Tian
Strong Identity-Based Proxy Signature Schemes, Revisited
Wireless Communications and Mobile Computing
author_facet Weiwei Liu
Yi Mu
Guomin Yang
Yangguang Tian
author_sort Weiwei Liu
title Strong Identity-Based Proxy Signature Schemes, Revisited
title_short Strong Identity-Based Proxy Signature Schemes, Revisited
title_full Strong Identity-Based Proxy Signature Schemes, Revisited
title_fullStr Strong Identity-Based Proxy Signature Schemes, Revisited
title_full_unstemmed Strong Identity-Based Proxy Signature Schemes, Revisited
title_sort strong identity-based proxy signature schemes, revisited
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8669
1530-8677
publishDate 2018-01-01
description Proxy signature is a useful cryptographic primitive that has been widely used in many applications. It has attracted a lot of attention since it was introduced. There have been lots of works in constructing efficient and secure proxy signature schemes. In this paper, we identify a new attack that has been neglected by many existing proven secure proxy signature schemes. We demonstrate this attack by launching it against an identity-based proxy signature scheme which is proven secure. We then propose one method that can effectively prevent this attack. The weakness in some other proxy signature schemes can also be fixed by applying the same method.
url http://dx.doi.org/10.1155/2018/6925019
work_keys_str_mv AT weiweiliu strongidentitybasedproxysignatureschemesrevisited
AT yimu strongidentitybasedproxysignatureschemesrevisited
AT guominyang strongidentitybasedproxysignatureschemesrevisited
AT yangguangtian strongidentitybasedproxysignatureschemesrevisited
_version_ 1725852383745933312