×

Cryptanalysis of Zhou et al.’s proxy-protected signature schemes. (English) Zbl 1076.94034

Summary: Quite recently, Y. Zhou, Z. Cao and R. Lu [Appl. Math. Comput. 164, No. 1, 83–98 (2005; Zbl 1072.94013)] proposed two proxy-protected signature schemes based on the RSA assumption and the hardness of integer factorization, respectively. They also provided security proofs for each signature scheme in the random oracle model. In this paper, we show that both schemes are not secure and suggest a method for fixing the security flaw.

MSC:

94A62 Authentication, digital signatures and secret sharing

Citations:

Zbl 1072.94013
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] A. Boldyreva, A. Palacio, B. Warinschi, Secure proxy signature schemes for delegation of signing rights, Cryptology ePrint Archive, Report 2003/096.; A. Boldyreva, A. Palacio, B. Warinschi, Secure proxy signature schemes for delegation of signing rights, Cryptology ePrint Archive, Report 2003/096. · Zbl 1272.94016
[2] Kim, S.; Park, S.; Won, D., Proxy signatures, revisited, (Information and Communication Security—ICICS’97. Information and Communication Security—ICICS’97, Lecture Notes in Computer Science, 1334 (1997), Springer-Verlag: Springer-Verlag Berlin), 223-232 · Zbl 0890.68049
[3] Lee, J.-Y.; Cheon, J. H.; Kim, S., An analysis of proxy signatures: Is a secure channel necessary?, (Topics in Cryptology—CT-RSA 2003. Topics in Cryptology—CT-RSA 2003, Lecture Notes in Computer Science, 2612 (2003), Springer-Verlag: Springer-Verlag Berlin), 68-79 · Zbl 1039.94528
[4] Y. Zhou, Z. Cao, R. Lu, Provably secure proxy-protected signature schemes based on factoring, Appl. Math. Comput., in press.; Y. Zhou, Z. Cao, R. Lu, Provably secure proxy-protected signature schemes based on factoring, Appl. Math. Comput., in press. · Zbl 1072.94013
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.