Authors: Jianhong Zhang; Jian Mao; Yuwei Xu
Addresses: Institution of Imagine Process and Pattern Recognition, North China University of Technology, Beijing 100144, China; The State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an 710071, China ' School of Electronic and Information Engineering, Beihang University, Beijing 100191, China; The State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an 710071, China ' Institution of Imagine Process and Pattern Recognition, North China University of Technology, Beijing 100144, China
Abstract: As an important delegation technique, proxy signature was introduced in 1996 by Mambo, Usuda, and Okamoto. And many variants of proxy signature schemes have been proposed. In some cases, to protect privacy of proxy signer, the identity of proxy signer is hidden. Recently, to satisfy the requirement of proxy signer's privacy protection, Hu et al. gave an enhanced ID-based anonymous proxy signature scheme from pairings, in which it allows that proxy signature produces an anonymous signature on behalf of original signer, and the identity of proxy signer is hidden. Meanwhile, it also allows the original signer to trace the actual identity of proxy signer. Unfortunately, in this paper, by analysing the scheme, we show that the scheme is insecure. It is universally forgeable, namely, anyone can produce an anonymous proxy signature on an arbitrary message. And the original signer can not also trace the actual identity of proxy signer. Finally, we give the corresponding attacks on the scheme and the reasons to produce such attacks. To overcome our attacks, we proposed an improved scheme based on bilinear map of composite order.
Keywords: security analysis; anonymous proxy signature; revocable anonymity; unforgeability; ID-based signature; privacy protection; forgeable signatures; proxy signer identity; bilinear maps.
International Journal of Embedded Systems, 2013 Vol.5 No.3, pp.181 - 188
Available online: 09 Oct 2013 *Full-text access for editors Access for subscribers Purchase this article Comment on this article