On the security of an ID-based anonymous proxy signature scheme and its improved scheme Online publication date: Wed, 09-Oct-2013
by Jianhong Zhang; Jian Mao; Yuwei Xu
International Journal of Embedded Systems (IJES), Vol. 5, No. 3, 2013
Abstract: As an important delegation technique, proxy signature was introduced in 1996 by Mambo, Usuda, and Okamoto. And many variants of proxy signature schemes have been proposed. In some cases, to protect privacy of proxy signer, the identity of proxy signer is hidden. Recently, to satisfy the requirement of proxy signer's privacy protection, Hu et al. gave an enhanced ID-based anonymous proxy signature scheme from pairings, in which it allows that proxy signature produces an anonymous signature on behalf of original signer, and the identity of proxy signer is hidden. Meanwhile, it also allows the original signer to trace the actual identity of proxy signer. Unfortunately, in this paper, by analysing the scheme, we show that the scheme is insecure. It is universally forgeable, namely, anyone can produce an anonymous proxy signature on an arbitrary message. And the original signer can not also trace the actual identity of proxy signer. Finally, we give the corresponding attacks on the scheme and the reasons to produce such attacks. To overcome our attacks, we proposed an improved scheme based on bilinear map of composite order.
Online publication date: Wed, 09-Oct-2013
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Embedded Systems (IJES):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com