Title: Remarks on the security of the strong proxy signature scheme with proxy signer privacy protection

Authors: Amit K. Awasthi

Addresses: Department of Mathematics, Pranveer Singh Institute of Technology, Bhauti, Kanpur-208020, UP, India

Abstract: In 1996, Mambo et al. introduced the proxy signature scheme for digital applications to delegate the signing capability to a proxy signer. Various constructions were made to devise a strong nondesignated proxy signature scheme. In 2002, Shum and Wei proposed an extended scheme to hide the identity of the proxy signer. A Trusted Authority (TA) can reveal the proxy signer|s identity if required. In this paper we show some possible attacks on this scheme.

Keywords: proxy signatures; warrant; cryptography; digital signatures; privacy protection; security; trusted authority; attacks; proxy signer identification.

DOI: 10.1504/IJICS.2010.031857

International Journal of Information and Computer Security, 2010 Vol.4 No.1, pp.24 - 29

Published online: 26 Feb 2010 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article