Attacks on One Designated Verifier Proxy Signature Scheme

In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the o...

Full description

Saved in:
Bibliographic Details
Main Author: Baoyuan Kang
Format: Article
Language:English
Published: Wiley 2012-01-01
Series:Journal of Applied Mathematics
Online Access:http://dx.doi.org/10.1155/2012/508981
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832548901920440320
author Baoyuan Kang
author_facet Baoyuan Kang
author_sort Baoyuan Kang
collection DOAJ
description In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the original signer. But only the designated verifier can verify the proxy signature. Several designated verifier proxy signature schemes have been proposed. However, most of them were proven secure in the random oracle model, which has received a lot of criticism since the security proofs in the random oracle model are not sound with respect to the standard model. Recently, by employing Water's hashing technique, Yu et al. proposed a new construction of designated verifier proxy signature. They claimed that the new construction is the first designated verifier proxy signature, whose security does not rely on the random oracles. But, in this paper, we will show some attacks on Yu et al.'s scheme. So, their scheme is not secure.
format Article
id doaj-art-8d4417a34db84893b04b0e2deb9bd0aa
institution Kabale University
issn 1110-757X
1687-0042
language English
publishDate 2012-01-01
publisher Wiley
record_format Article
series Journal of Applied Mathematics
spelling doaj-art-8d4417a34db84893b04b0e2deb9bd0aa2025-02-03T06:12:45ZengWileyJournal of Applied Mathematics1110-757X1687-00422012-01-01201210.1155/2012/508981508981Attacks on One Designated Verifier Proxy Signature SchemeBaoyuan Kang0Computer Science and Software Institution, Tianjin Polytechnic University, 399 Binshuixi road, Tianjin 300387, ChinaIn a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the original signer. But only the designated verifier can verify the proxy signature. Several designated verifier proxy signature schemes have been proposed. However, most of them were proven secure in the random oracle model, which has received a lot of criticism since the security proofs in the random oracle model are not sound with respect to the standard model. Recently, by employing Water's hashing technique, Yu et al. proposed a new construction of designated verifier proxy signature. They claimed that the new construction is the first designated verifier proxy signature, whose security does not rely on the random oracles. But, in this paper, we will show some attacks on Yu et al.'s scheme. So, their scheme is not secure.http://dx.doi.org/10.1155/2012/508981
spellingShingle Baoyuan Kang
Attacks on One Designated Verifier Proxy Signature Scheme
Journal of Applied Mathematics
title Attacks on One Designated Verifier Proxy Signature Scheme
title_full Attacks on One Designated Verifier Proxy Signature Scheme
title_fullStr Attacks on One Designated Verifier Proxy Signature Scheme
title_full_unstemmed Attacks on One Designated Verifier Proxy Signature Scheme
title_short Attacks on One Designated Verifier Proxy Signature Scheme
title_sort attacks on one designated verifier proxy signature scheme
url http://dx.doi.org/10.1155/2012/508981
work_keys_str_mv AT baoyuankang attacksononedesignatedverifierproxysignaturescheme