By Topic

Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Shuhong Wang ; Sch. of Math. Sci., Peking Univ., China ; Guilin Wang ; Feng Bao ; Jie Wang

Proxy signature allows the original signer to delegate his/her signing capability to a proxy signer such that the proxy signer can sign messages on behalf of the original signer. With an elliptic curve based scheme, one can obtain better efficiency compared to conventional proxy signatures. However, taking security into account, a good signature scheme should be designed to meet its basic security requirements. We present an original signer forgery attack on an elliptic curve based proxy signature proposed recently (Chen, T.S. et al., Proc. IEEE TENCOM'02, p.184-7, 2002). By first constructing a forged proxy signature key pair, the attack is successful in forging signatures on any message. An improvement is presented to he secure against the proposed attack and the efficiency is comparable to the original scheme.

Published in:

Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th  (Volume:5 )

Date of Conference:

26-29 Sept. 2004