Abstract
A Proxy multi-signature scheme allows an authorized proxy signer to sign on a message on behalf of a group of original signers. Recently Cao and Cao proposed an identity-based proxy signature scheme and claimed that the scheme is provably secure in random oracle model. In this paper we have reviewed the scheme and proven that the scheme is vulnerable to chosen message attack under the defined security model. To prevent this attack, we propose an improvement over existing identity-based signature scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Feng, C., Zhenfu, C.: A secure identity-based proxy multi-signature scheme. Inf. Sci. 179, 292–302 (2009)
Hu, X., Jianbin, H., Zhong, C., Fagen, L.: On the security of an identity based multi-proxy signature scheme. Comput. Electr. Eng. 37, 129–135 (2011)
Mambo, M., Usuda, K., Okamoto, K.: Proxy signatures: delegation of the power to sign message. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E79–A(9), 1338–1353 (1996)
Bakker, A., Steen, M., Tanenbaum, A.S.: A law-abiding peer-to-peer network for free-software distribution. IEEE International Symposium on Network Computing and Applications, pp. 60–67 (2001)
Park, H.-U., Lee, I.-Y.: A digital nominative proxy signature scheme for mobile communication. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 451–455. Springer, Heidelberg (2001). doi:10.1007/3-540-45600-7_49
Hwang, S., Shi, C.: A simple multi-proxy signature scheme. In: Proceedings of the 10th National Conference on Information Security, Hualien, Taiwan, ROC, pp. 134–138 (2000)
Leiwo, J., Hänle, C., Homburg, P., Tanenbaum, A.S.: Disallowing unauthorized state changes of distributed shared objects. In: Qing, S., Eloff, J.H.P. (eds.) SEC 2000. ITIFIP, vol. 47, pp. 381–390. Springer, Boston, MA (2000). doi:10.1007/978-0-387-35515-3_39
Hwang, S.J., Chen, C.C.: New multi-proxy multi-signature schemes. Appl. Math. Comput. 147, 57–67 (2004)
Lee, B., Kim, H., Kim, K.: Secure mobile agent using strong non-designated proxy signature. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 474–486. Springer, Heidelberg (2001). doi:10.1007/3-540-47719-5_37
Zhang, K.: Threshold proxy signature schemes. In: Proceedings of the First International Workshop on Information Security, pp. 282–290 (1997)
Kar, J.: Provably secure online/off-line identity-based signature scheme for wireless sensor network. Int. J. Netw. Secur. Taiwan 16(01), 26–36 (2014)
Kim, H., Baek, J., Lee, B., Kim, K.: Secret computation with secrets for mobile agent using one-time proxy signature. In: Cryptography and Information Security (2001)
Awasthi, A.K., Lal, S.: Proxy blind signature scheme. Trans. Cryptol. 2(1), 5–11 (2005)
Kar, J.: Proxy Blind Multi-signature Scheme using ECC for hand-held devices. IACR Archive e-print 2011–043 (2011)
Li, J., Chen, X., Yuen, T.H.: Proxy ring signature: formal definitions, efficient construction and new variant. In: Wang, Y., Cheung, Y., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol. 4456, pp. 545–555. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74377-4_57
Kar, J.: Cryptanalysis of provably secure certificateless short signature scheme by solving linear diophantine equations. ICIC Express Lett. Japan 11(3), 619–624 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Kar, J. (2017). Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-64701-2_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64700-5
Online ISBN: 978-3-319-64701-2
eBook Packages: Computer ScienceComputer Science (R0)