Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme
スポンサーリンク
概要
- 論文の詳細を見る
In a proxy multi-signature scheme, a designated proxy signer can generate the signature on behalf of a group of original signers. Recently, Wang and Cao proposed an identity based proxy multi-signature scheme along with a security model. Although they proved that their scheme is secure under this model, we disprove their claim and show that their scheme is not secure.
- (社)電子情報通信学会の論文
- 2008-07-01
著者
-
Zhou Shijie
School Of Computer Science And Engineering University Of Electronic Science And Technology Of China
-
SUN Rong
State Key Lab. of Integrated Service Networks, Xidian Univ.
-
Sun Rong
State Key Laboratory Of Integrated Service Networks Xidian University
-
Sun Rong
State Key Lab Of Isn Xidian University
-
LI Fagen
School of Computer Science and Engineering, University of Electronic Science and Technology of China
-
Li Fagen
School Of Computer Science And Engineering University Of Electronic Science And Technology Of China
-
Li Fagen
Univ. Electronic Sci. And Technol. Of China Chengdu Chn
-
Li Fagen
School Of Computer Science And Engineering The University Of Electronic Science And Technology Of China
関連論文
- Trace Representation of a New Class of Sextic Residue Sequences of Period p≡3 (mod 8)
- Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings
- On the Linear Complexity of Some Ternary Sequences with Ideal Autocorrelation
- Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme
- Parity-Check Matrix Extension to Lower the Error Floors of Irregular LDPC Codes
- A Construction of Binary Cyclotomic Sequences Using Extension Fields
- Analysis of an Identity-Based Signcryption Scheme in the Standard Model
- Autocorrelation and Linear Complexity of the New Generalized Cyclotomic Sequences(Information Security)
- Semi-Irregular LDPC Codes Used in MBC(Wireless Communication Technologies)
- An Improved Authenticated Encryption Scheme
- Lowering Error Floors of Irregular LDPC Codes by Combining Construction and Decoding
- Design of Quasi-Cyclic Cycle LDPC Codes over GF(q)
- Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
- Design of Quasi-Cyclic Cycle LDPC Codes over GF(q)
- Dynamic Bubble-Check Algorithm for Check Node Processing in Q-Ary LDPC Decoders
- Nonbinary Quasi-Cyclic LDPC Cycle Codes with Low-Density Systematic Quasi-Cyclic Generator Matrices
- Linear Transmitter Precoding Design with Matching Weighted SLNR for Multiuser MIMO Downlink Systems
- Iterative Decoding for the Davey-MacKay Construction over IDS-AWGN Channel
- Improvement on a Knapsack-Based Probabilistic Encryption Scheme
- Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing