On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
スポンサーリンク
概要
- 論文の詳細を見る
Observing the security of existing identity-based proxy signature schemes was proven in the random oracle model, Cao et al. proposed the first direct construction of identity-based proxy signature secure in the standard model by making use of the identity-based signature due to Paterson and Schuldt. They also provided a security proof to show their construction is secure against forgery attacks without resorting to the random oracles. Unfortunately, in this letter, we demonstrate that their scheme is vulnerable to insider attacks. Specifically, after a private-key extraction query, an adversary, behaving as a malicious original signer or a malicious proxy signer, is able to violate the unforgeability of the scheme.
- The Institute of Electronics, Information and Communication Engineersの論文
著者
-
Yu Yong
School Of Computer Science And Engineering University Of Electronic Science And Technology Of China
-
SUN Ying
Sichuan Electric Power Research Institute
-
ZHANG Xiaosong
School of Computer Science and Engineering, University of Electronic Science and Technology of China
-
CHAI Jiwen
Sichuan Electric Power Research Institute
関連論文
- Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings
- Sensor-based probabilistic roadmaps: experiments with an eye-in-hand system
- Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme
- Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks
- On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model