Title :
Security enhancement of a novel proxy key generation protocol
Author :
Chiung-Chou Tsai ; Liao, Kuan-Chieh ; Chen, Tzung-Her ; Lee, Wei-Bin
Author_Institution :
Feng Chia Univ., Taichung
Abstract :
Proxy signature is a variant of digital signature, in which the proxy signer could sign message on behalf of the original signer. In 2007, Hu et al. introduced a mechanism into the proxy signature model to allow rebuilding the short-term proxy key in a very efficient way. The mechanism reflects the necessary while the content stated in the warrant has been changed. Unfortunately, the new mechanism solves the demand on changing warrant but introduce a new security issue that the genuine long-term secret key of the proxy signer will be exposed if one of the proxy keys is compromised. Therefore, the impersonation attack is possible in Hu et al.´s scheme. In this paper, the security weakness will be examined and remedied. The enhanced version still retains the merits of the original design and this Elliptic curve based scheme is definitely adaptive for the mobile environment to provide a security solution for the next century.
Keywords :
cryptographic protocols; digital signatures; public key cryptography; Elliptic curve based scheme; digital signature; impersonation attack; long-term secret key; mobile environment; proxy key generation protocol; proxy signature model; security enhancement; Cities and towns; Computer science; Computer security; Costs; Digital signatures; Elliptic curves; Information security; National security; Protocols; Public key;
Conference_Titel :
Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International
Conference_Location :
Beijing
Print_ISBN :
0-7695-2870-8
DOI :
10.1109/COMPSAC.2007.186