Attacks on One Designated Verifier Proxy Signature Scheme

被引:1
|
作者
Kang, Baoyuan [1 ]
机构
[1] Tianjin Polytech Univ, Comp Sci & Software Inst, Tianjin 300387, Peoples R China
关键词
D O I
10.1155/2012/508981
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the original signer. But only the designated verifier can verify the proxy signature. Several designated verifier proxy signature schemes have been proposed. However, most of them were proven secure in the random oracle model, which has received a lot of criticism since the security proofs in the random oracle model are not sound with respect to the standard model. Recently, by employing Water's hashing technique, Yu et al. proposed a new construction of designated verifier proxy signature. They claimed that the new construction is the first designated verifier proxy signature, whose security does not rely on the random oracles. But, in this paper, we will show some attacks on Yu et al.'s scheme. So, their scheme is not secure.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] A Real Quantum Designated Verifier Signature Scheme
    Wei-Min Shi
    Yi-Hua Zhou
    Yu-Guang Yang
    International Journal of Theoretical Physics, 2015, 54 : 3115 - 3123
  • [42] An improved strong designated verifier signature scheme
    Li, Chao
    Zhang, SongSong
    Zhang, Yilai
    Xie, Yong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (12):
  • [43] A New Strong Designated Verifier Signature Scheme
    Shapuan, N.
    Ismail, E. S.
    2017 UKM FST POSTGRADUATE COLLOQUIUM, 2018, 1940
  • [44] Forgery Attacks on Lee-Chang's Strong Designated Verifier Signature Scheme
    Hyun, Suhng-Ill
    Yoon, Eun-Jun
    Yoo, Kee-Young
    2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING SYMPOSIA, VOLS 1-5, PROCEEDINGS, 2008, : 101 - +
  • [45] A Provably Secure ID-based Designated Verifier Proxy Signature Scheme Based on DLP
    Wei, Baodian
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 721 - 724
  • [46] Attribute-based Message Recovery Designated Verifier Proxy Signature Scheme in Telemedicine System
    Hu, Yu
    Zhang, Yi-Fan
    Huang, Hui
    Zhou, Yu-Ping
    Journal of Network Intelligence, 2022, 7 (01): : 101 - 113
  • [47] Study on Designated Verifier Proxy Signature Schemes with Provable Security
    Hu, Xiaoming
    Yang, Yinchun
    Zhang, Xiaojun
    Xu, Huajie
    Wang, Jian
    PROCEEDINGS OF 2016 2ND INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING (ICCSSE), 2016, : 5 - 9
  • [48] Designated confirmer proxy signature scheme
    Lee, Ji-Seon
    Chang, Jik Hyun
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 137 - +
  • [49] Traceable Universal Designated Verifier Signature Proof Scheme
    Tang F.
    Ma S.
    Ma C.-L.
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (11): : 4305 - 4315
  • [50] Semi- quantum Designated Verifier Signature Scheme
    Ling Zhang
    Jia-Hao Zhang
    Xiang-Jun Xin
    Min Huang
    Chao-Yang Li
    International Journal of Theoretical Physics, 62