Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Proxy signature schemes based on factoring
Information Processing Letters
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Threshold Proxy Signature Schemes
ISW '97 Proceedings of the First International Workshop on Information Security
Provably secure proxy-protected signature schemes based on RSA
Computers and Electrical Engineering
A new proxy signature scheme for a specified group of verifiers
Information Sciences: an International Journal
Hi-index | 0.00 |
The proxy signature scheme enables an original signer to delegate his/her signing capability to a designated proxy signer, thereby the proxy signer can sign messages on behalf of the original signer. Recently, Zhou et al. proposed two proxy-protected signature schemes. One is based on the RSA problem and the other is based on the integer factorization problem. In this paper, however, we point out that Zhou et al.'s schemes are insecure against undelegated proxy signature attack because any user without the delegation of the original signer can generate a valid proxy signature. To solve this problem, an improved scheme is proposed and its security is analyzed.