DocumentCode :
1796513
Title :
Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme
Author :
Limin Sha
Author_Institution :
Sch. of Comput. & Inf., Shanghai Second Polytech. Univ., Shanghai, China
fYear :
2014
fDate :
June 30 2014-July 2 2014
Firstpage :
1
Lastpage :
4
Abstract :
This paper analyzes two proxy signature schemes´ security, and proves that they exist loopholes. Xu´s ID-based proxy signature scheme without trusted PKG is not safe, because there exists a security attack which original signer can tamper with the proxy warrant allayed with PKG.Hu´s proxy blind multi-signature scheme also exists a security attack that the signature requester can tamper with the proxy warrant.
Keywords :
digital signatures; trusted computing; ID based proxy signature scheme analysis; Xu ID based proxy signature scheme; proxy blind multisignature scheme; proxy warrant; security attack; signature requester; trusted PKG; Equations; Law; Public key; Safety; Private Key Generator(PKG); proxy blind multi-signature; proxy signature; security analysis; warrant;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2014 15th IEEE/ACIS International Conference on
Conference_Location :
Las Vegas, NV
Type :
conf
DOI :
10.1109/SNPD.2014.6888700
Filename :
6888700
Link To Document :
بازگشت