By Topic

Attack on a certificateless signature and threshold proxy signature with revoking anonymity

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Jianhong Zhang ; Coll. of Sci., North China Univ. of Technol., Beijing, China ; Xiuna Su

Certificateless cryptography is an alternative cryptography, since it eliminates the use of certificates in traditional public key cryptography and the key-escrow problem in identity based cryptography. Proxy signature is an important delegation technique. Certificateless cryptography and proxy signature play an important role in e-commerce. Recently, Xu et.al proposed a certificateless signature for mobile wireless cyber-physical system. In the paper, we show that the scheme is insecure and give stronger attack on the scheme. And we also analyze the security of a blind threshold proxy signature scheme with revoking anonymity and show that the scheme is insecure against proxy signer's attack, namely, $m$ proxy signers can produce a forged proxy signature on arbitrary a message without original signer's delegation.

Published in:

Computer Engineering and Technology (ICCET), 2010 2nd International Conference on  (Volume:1 )

Date of Conference:

16-18 April 2010