{"title":"Breaking a proxy ring signature with revocable anonymity in MINE2009","authors":"Jianhong Zhang, Hua Chen","doi":"10.1109/ICNDS.2010.5479266","DOIUrl":null,"url":null,"abstract":"Proxy signature is an important delegation technique. Since it was introduced in 1996, many variants of proxy signature schemes have been proposed. Among of them, the requirement of proxy signer's privacy protection and the revocation of proxy signer's anonymous identity are needful in some practical applications. Recently, Wang et.al gave a new signature type: proxy ring signature with revocable anonymity. It allows that proxy signer anonymously produces a proxy signature. However, it is anonymous for the others except that the original signer can know exactly who is the actual proxy signer. Unfortunately, in this paper, by analyzing the scheme, we show that the scheme does not satisfy anonymity, that is to say, given an anonymous proxy signature, the others also can know the actual identity of proxy signer beside original signer. At the same time, it cannot also revoke anonymity of proxy signer's identity. Finally, we give the corresponding attacks on the scheme and the reasons to produce suck attacks.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Networking and Digital Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNDS.2010.5479266","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Proxy signature is an important delegation technique. Since it was introduced in 1996, many variants of proxy signature schemes have been proposed. Among of them, the requirement of proxy signer's privacy protection and the revocation of proxy signer's anonymous identity are needful in some practical applications. Recently, Wang et.al gave a new signature type: proxy ring signature with revocable anonymity. It allows that proxy signer anonymously produces a proxy signature. However, it is anonymous for the others except that the original signer can know exactly who is the actual proxy signer. Unfortunately, in this paper, by analyzing the scheme, we show that the scheme does not satisfy anonymity, that is to say, given an anonymous proxy signature, the others also can know the actual identity of proxy signer beside original signer. At the same time, it cannot also revoke anonymity of proxy signer's identity. Finally, we give the corresponding attacks on the scheme and the reasons to produce suck attacks.