Cryptanalysis of efficient proxy signature schemes for mobile communication

Fa Gen Li, Masaaki Shirase, Tsuyoshi Takagi

Research output: Contribution to journalArticlepeer-review

6 Citations (Scopus)

Abstract

In a proxy signature scheme, an original signer is allowed to delegate his signing power to a designated person, called the proxy signer and the proxy signer is able to sign the messages on behalf of the original signer. Recently, Lu, Dong and Cao proposed two proxy signature schemes for mobile communication (see Sci China Ser F-Inf Sci, 2008, 51(2): 183-195). Although they proved that their schemes are secure in the random oracle model, we disprove their claim and show that their schemes are not secure.

Original languageEnglish
Pages (from-to)2016-2021
Number of pages6
JournalScience in China, Series F: Information Sciences
Volume53
Issue number10
DOIs
Publication statusPublished - 2010

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Fingerprint Dive into the research topics of 'Cryptanalysis of efficient proxy signature schemes for mobile communication'. Together they form a unique fingerprint.

Cite this