Park, Je Hong; Kang, Bo Gyeong; Han, Jae Woo Cryptanalysis of Zhou et al.’s proxy-protected signature schemes. (English) Zbl 1076.94034 Appl. Math. Comput. 169, No. 1, 192-197 (2005). Summary: Quite recently, Y. Zhou, Z. Cao and R. Lu [Appl. Math. Comput. 164, No. 1, 83–98 (2005; Zbl 1072.94013)] proposed two proxy-protected signature schemes based on the RSA assumption and the hardness of integer factorization, respectively. They also provided security proofs for each signature scheme in the random oracle model. In this paper, we show that both schemes are not secure and suggest a method for fixing the security flaw. Cited in 3 Documents MSC: 94A62 Authentication, digital signatures and secret sharing Citations:Zbl 1072.94013 PDFBibTeX XMLCite \textit{J. H. Park} et al., Appl. Math. Comput. 169, No. 1, 192--197 (2005; Zbl 1076.94034) Full Text: DOI References: [1] A. Boldyreva, A. Palacio, B. Warinschi, Secure proxy signature schemes for delegation of signing rights, Cryptology ePrint Archive, Report 2003/096.; A. Boldyreva, A. Palacio, B. Warinschi, Secure proxy signature schemes for delegation of signing rights, Cryptology ePrint Archive, Report 2003/096. · Zbl 1272.94016 [2] Kim, S.; Park, S.; Won, D., Proxy signatures, revisited, (Information and Communication Security—ICICS’97. Information and Communication Security—ICICS’97, Lecture Notes in Computer Science, 1334 (1997), Springer-Verlag: Springer-Verlag Berlin), 223-232 · Zbl 0890.68049 [3] Lee, J.-Y.; Cheon, J. H.; Kim, S., An analysis of proxy signatures: Is a secure channel necessary?, (Topics in Cryptology—CT-RSA 2003. Topics in Cryptology—CT-RSA 2003, Lecture Notes in Computer Science, 2612 (2003), Springer-Verlag: Springer-Verlag Berlin), 68-79 · Zbl 1039.94528 [4] Y. Zhou, Z. Cao, R. Lu, Provably secure proxy-protected signature schemes based on factoring, Appl. Math. Comput., in press.; Y. Zhou, Z. Cao, R. Lu, Provably secure proxy-protected signature schemes based on factoring, Appl. Math. Comput., in press. · Zbl 1072.94013 This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.