{"title":"代理保护签名方案的密码分析与改进","authors":"Xiaoming Hu, Zhe Zhang, Tong Wang","doi":"10.1109/ICFN.2010.63","DOIUrl":null,"url":null,"abstract":"Recently, Liu et al. (Liu YC, Wen HA, Lin CL, Hwang T. Proxy-protected signature secure against the undelegated proxy signature attack. Computers and Electrical Engineering 2007; 33: 177-85) proposed one proxy signature scheme that is the improvement of Zhou et al.'s (Zhou Y, Cao Z, Lu R. Provably secure proxy-protected signature schemes based on factoring. Appl Math Comput2005; 164(1):83-98) proxy signature scheme based on the hard problem of integer factorization. In this paper, however,we show that Liu et al.’s scheme and Zhou et al.’s scheme are insecure against the replaced warrant attack: the original signer can prepare a new warrant and then remove the original warrant from the proxy signature to forge a new and valid proxy signature with the new warrant. To avoid the problem, an improved proxy signature scheme is proposed and its security is analyzed.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cryptanalysis and Improvement of a Proxy-protected Signature Scheme\",\"authors\":\"Xiaoming Hu, Zhe Zhang, Tong Wang\",\"doi\":\"10.1109/ICFN.2010.63\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, Liu et al. (Liu YC, Wen HA, Lin CL, Hwang T. Proxy-protected signature secure against the undelegated proxy signature attack. Computers and Electrical Engineering 2007; 33: 177-85) proposed one proxy signature scheme that is the improvement of Zhou et al.'s (Zhou Y, Cao Z, Lu R. Provably secure proxy-protected signature schemes based on factoring. Appl Math Comput2005; 164(1):83-98) proxy signature scheme based on the hard problem of integer factorization. In this paper, however,we show that Liu et al.’s scheme and Zhou et al.’s scheme are insecure against the replaced warrant attack: the original signer can prepare a new warrant and then remove the original warrant from the proxy signature to forge a new and valid proxy signature with the new warrant. To avoid the problem, an improved proxy signature scheme is proposed and its security is analyzed.\",\"PeriodicalId\":185491,\"journal\":{\"name\":\"2010 Second International Conference on Future Networks\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-01-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Second International Conference on Future Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICFN.2010.63\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Future Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFN.2010.63","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
摘要
最近,Liu等人(刘玉春,文哈,林春林,黄涛)。代理保护签名可以抵御未授权代理签名攻击。计算机与电气工程2007;(33: 177-85)提出了一种基于保理的可证明安全的代理保护签名方案,该方案是对Zhou等人(Zhou Y, Cao Z, Lu r)的改进。苹果数学计算机2005;基于整数分解难题的代理签名方案,164(1):83-98。然而,在本文中,我们证明了Liu等人的方案和Zhou等人的方案对于替换权证攻击是不安全的:原始签名者可以准备一个新的权证,然后从代理签名中删除原始权证,用新的权证伪造一个新的有效的代理签名。为了避免这个问题,提出了一种改进的代理签名方案,并对其安全性进行了分析。
Cryptanalysis and Improvement of a Proxy-protected Signature Scheme
Recently, Liu et al. (Liu YC, Wen HA, Lin CL, Hwang T. Proxy-protected signature secure against the undelegated proxy signature attack. Computers and Electrical Engineering 2007; 33: 177-85) proposed one proxy signature scheme that is the improvement of Zhou et al.'s (Zhou Y, Cao Z, Lu R. Provably secure proxy-protected signature schemes based on factoring. Appl Math Comput2005; 164(1):83-98) proxy signature scheme based on the hard problem of integer factorization. In this paper, however,we show that Liu et al.’s scheme and Zhou et al.’s scheme are insecure against the replaced warrant attack: the original signer can prepare a new warrant and then remove the original warrant from the proxy signature to forge a new and valid proxy signature with the new warrant. To avoid the problem, an improved proxy signature scheme is proposed and its security is analyzed.