An Efficient and Provably Secure Threshold Blind Signature
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Proposal of Short Proxy Signature using Pairing
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume I - Volume 01
DLP Based Proxy Blind Signature Scheme with Low-Computation
NCM '09 Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Efficient partially blind signatures with provable security
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
A Secure Proxy Blind Signature Scheme Based on DLP
MINES '10 Proceedings of the 2010 International Conference on Multimedia Information Networking and Security
An identity-based proxy signature scheme from pairings
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
ID-Based proxy signature using bilinear pairings
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Cryptanalysis of a forward secure blind signature scheme with provable security
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Hi-index | 0.00 |
Proxy blind signature is a cryptographical technique and allows a proxy signer to produce a proxy blind signature on behalf of original signer, in such a way that the authority learns nothing about the message that is being signed. The unforgeability is an important property of digital signature. In this work, we analyze security of two DLP-based proxy blind signature schemes, and show that the two schemes are insecure. They are universally forgeable, in other words, anyone is able to forge a proxy blind signature on arbitrary a message. And we also analyze the reason to produce such attack. Finally, the corresponding attack is given.