Cryptanalysis of Zhou et al.'s proxy-protected signature schemes

被引:14
|
作者
Park, JH
Kang, BG
Han, JW
机构
[1] Natl Secur Res Inst, Taejon 305350, South Korea
[2] Korea Adv Inst Sci & Technol, Dept Math, Taejon 305701, South Korea
关键词
cryptography; proxy signature scheme; signature scheme; RSA assumption; security analysis;
D O I
10.1016/j.amc.2004.10.051
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Quite recently, Zhou et al. proposed two proxy-protected signature schemes based oil the RSA assumption and the hardness of integer factorization, respectively. They also provided security proofs for each signature scheme in the random oracle model. In this paper, we show that both schemes are not secure and suggest a method for fixing the security flaw. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:192 / 197
页数:6
相关论文
共 50 条
  • [31] Reply to Zhou et al.
    Kagimoto, Atsushi
    Tsutani, Yasuhiro
    Okada, Morihito
    EUROPEAN JOURNAL OF CARDIO-THORACIC SURGERY, 2022, 62 (04)
  • [32] Zhou et al. Reply:
    Zhou, Qi
    Kato, Yasuyuki
    Kawashima, Naoki
    Trivedi, Nandini
    Physical Review Letters, 2010, 105 (19)
  • [33] Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Gopalakrishnan, Ragavendran
    Karuturi, Naga Naresh
    Rangan, C. Pandu
    INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 115 - 129
  • [34] Security analysis and improvement of hsu et al.'s threshold proxy signature scheme
    Institute of Systems Science, Academy of Mathematics and System Sciences, Chinese Academy of Sciences, Graduate School of Chinese Academy of Sciences, Beijing 100080, China
    不详
    不详
    不详
    Int. J. Netw. Secur., 2006, 1 (69-72):
  • [35] Improvement on Huang et al.'s Novel Efficient Threshold Proxy Signature Scheme
    Hu, Jiang-hong
    Huang, Mei-juan
    Zhang, Jian-zhong
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 116 - 119
  • [36] Cryptanalysis and Improvement of Some Quantum Proxy Blind Signature Schemes
    Zhang, Long
    Li, Shuang
    Zhang, Ke-Jia
    Sun, Hong-Wei
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (04) : 1047 - 1059
  • [37] Cryptanalysis of some group-oriented proxy signature schemes
    Park, JH
    Kang, BG
    Park, S
    INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 10 - 24
  • [38] Cryptanalysis and Improvement of Some Quantum Proxy Blind Signature Schemes
    Long Zhang
    Shuang Li
    Ke-Jia Zhang
    Hong-Wei Sun
    International Journal of Theoretical Physics, 2019, 58 : 1047 - 1059
  • [39] Cryptanalysis of nonrepudiable threshold proxy signature schemes with known signers
    Hwang, SJ
    Chen, CC
    INFORMATICA, 2003, 14 (02) : 205 - 212
  • [40] Cryptanalysis of two ECDLP-based proxy signature schemes
    School of Computer Science and Technology, Nanhu Campus, China University of Mining and Technology, Xuzhou 221116, China
    J. Comput. Inf. Syst., 2008, 5 (2161-2165):