{"title":"基于椭圆曲线的代理签名广义方案的改进","authors":"Zuowen Tan","doi":"10.1109/CIS.2007.78","DOIUrl":null,"url":null,"abstract":"In a generalized (t1/n1-t2/n2) proxy signature scheme with known signers, any t1 or more original signers out of n1 original signers (1 t1 n1) can represent the original group to delegate the signing capability, and t2 or more proxy signers out of n2 proxy signers (1 t2 n2) can represent the proxy group to sign message on behalf of the original group. In the paper, we show that Hwang et al.'s generalized proxy signature scheme is vulnerable to the original signers' forgery attack. After a malicious original group of t1 (t1 t1 n1) signers obtains a proxy sig- nature (Mw, K, AOSID, M, R, S, AP SID), the original signer group can collude to generate a generalized proxy signature without the agreement of the proxy group with the identities AP SID. Hwang et al.'s generalized proxy signa- ture scheme is unable to meet nonrepudiation. We propose an improved generalized proxy signature scheme which can resist our original signer group's collusion attack.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Improvement on a Generalized Scheme of Proxy Signature Based on Elliptic Curves\",\"authors\":\"Zuowen Tan\",\"doi\":\"10.1109/CIS.2007.78\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In a generalized (t1/n1-t2/n2) proxy signature scheme with known signers, any t1 or more original signers out of n1 original signers (1 t1 n1) can represent the original group to delegate the signing capability, and t2 or more proxy signers out of n2 proxy signers (1 t2 n2) can represent the proxy group to sign message on behalf of the original group. In the paper, we show that Hwang et al.'s generalized proxy signature scheme is vulnerable to the original signers' forgery attack. After a malicious original group of t1 (t1 t1 n1) signers obtains a proxy sig- nature (Mw, K, AOSID, M, R, S, AP SID), the original signer group can collude to generate a generalized proxy signature without the agreement of the proxy group with the identities AP SID. Hwang et al.'s generalized proxy signa- ture scheme is unable to meet nonrepudiation. We propose an improved generalized proxy signature scheme which can resist our original signer group's collusion attack.\",\"PeriodicalId\":127238,\"journal\":{\"name\":\"2007 International Conference on Computational Intelligence and Security (CIS 2007)\",\"volume\":\"117 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-12-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Conference on Computational Intelligence and Security (CIS 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS.2007.78\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2007.78","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improvement on a Generalized Scheme of Proxy Signature Based on Elliptic Curves
In a generalized (t1/n1-t2/n2) proxy signature scheme with known signers, any t1 or more original signers out of n1 original signers (1 t1 n1) can represent the original group to delegate the signing capability, and t2 or more proxy signers out of n2 proxy signers (1 t2 n2) can represent the proxy group to sign message on behalf of the original group. In the paper, we show that Hwang et al.'s generalized proxy signature scheme is vulnerable to the original signers' forgery attack. After a malicious original group of t1 (t1 t1 n1) signers obtains a proxy sig- nature (Mw, K, AOSID, M, R, S, AP SID), the original signer group can collude to generate a generalized proxy signature without the agreement of the proxy group with the identities AP SID. Hwang et al.'s generalized proxy signa- ture scheme is unable to meet nonrepudiation. We propose an improved generalized proxy signature scheme which can resist our original signer group's collusion attack.