On zhang’s nonrepudiable proxy signature schemes

Narn Yih Lee, Tzonelih Hwang, Chih Hung Wang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

55 Citations (Scopus)

Abstract

In 1997, Zhang proposed two new nonrepudiable proxy signature schemes to delegate signing capability. Both schemes claimed to have a property of knowing that a proxy signature is generated by either the original signer or a proxy signer. However, this paper will show that Zhang's second scheme fails to possess this property. Moreover, we shall show that the proxy signer can cheat to get the original signer's signature, if Zhang's scheme is based on some variants of E1Gamal-type signature schemes. We modify Zhang's nonrepudiable proxy signature scheme to avoid the above attacks. The modified scheme also investigates a new feature for the original signer to limit the delegation time to a certain period.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 3rd Australasian Conference, ACISP 1998, Proceedings
EditorsColin Boyd, Ed Dawson
PublisherSpringer Verlag
Pages415-422
Number of pages8
ISBN (Print)3540647325, 9783540647324
DOIs
Publication statusPublished - 1998 Jan 1
Event3rd Australasian Conference on Information Security and Privacy, ACISP 1998 - Brisbane, Australia
Duration: 1998 Jul 131998 Jul 15

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1438
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd Australasian Conference on Information Security and Privacy, ACISP 1998
CountryAustralia
CityBrisbane
Period98-07-1398-07-15

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'On zhang’s nonrepudiable proxy signature schemes'. Together they form a unique fingerprint.

Cite this