Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
9506304 | Applied Mathematics and Computation | 2005 | 7 Pages |
Abstract
Hwang et al. proposed their generalization of proxy signature schemes based on elliptic curves. However, two attacks are proposed to show that their schemes have serious security flaws. By the first attack, an adversary can forge an illegal proxy signature that verifiers cannot actually find out the original signers of proxy signatures. The second attack is used to change proxy signatures into multi-signatures belonging to the group that actually generates the proxy signatures. To overcome these flaws, our improvement on Hwang et al.'s scheme is also proposed.
Keywords
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
Shin-Jia Hwang, Chia-Wei Huang,