Options
Forgery attacks of an identity‐based multi‐proxy signature scheme
Journal
International Journal of Communication Systems
ISSN
1074-5351
Date Issued
2014-07
DOI
http://onlinelibrary.wiley.com/doi/10.1002/dac.2828
Abstract
Multi‐proxy signature is used to delegate a permission of an owner to at least two proxies in the digital world. Recently, Sahu and Padhye gave a new construction of identity‐based multi‐proxy signature. Their scheme's security was supported by a reduction proof against a hard mathematical problem. Even supported by such security proofs, we present some forgery attacks against Sahu and Padhye's scheme. We demonstrate that any dishonest insider or any malicious outsider can break the security of Sahu and Padhye's scheme by forging either a permission or a multi‐proxy signature. In fact, our forgery attacks exploit the security weakness in their underlying identity‐based signature scheme, which is the fundamental constructing component of their proposed scheme. Copyright © 2014 John Wiley & Sons, Ltd.
File(s)
Loading...
Name
Picture1.png
Size
3.11 KB
Format
PNG
Checksum
(MD5):21881560e0c3c9c06b18c6e8fdc11acf
