scholarly journals On the Security of a Certificateless Proxy Signature Scheme with Message Recovery

2013 ◽  
Vol 2013 ◽  
pp. 1-4 ◽  
Author(s):  
Wenbo Shi ◽  
Debiao He ◽  
Peng Gong

A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. It has lots of practical applications in distributed systems, grid computing, mobile agent applications, distributed shared object systems, global distribution networks, and mobile communications. Recently, Padhye et al. proposed a certificateless proxy signature scheme with message recovery and claimed the scheme is secure against both of the two types of adversaries. However, in this paper, we will show that Padhye et al.’s scheme is not secure against the Type I adversary. The analysis shows their scheme is not secure for practical applications.

2014 ◽  
Vol 2014 ◽  
pp. 1-10
Author(s):  
Lunzhi Deng ◽  
Jiwen Zeng ◽  
Yunyun Qu

Although some good results were achieved in speeding up the computation of pairing function in recent years, it is still interesting to design efficient cryptosystems with less bilinear pairing operation. A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. We propose a certificateless proxy signature (CLPS) scheme from RSA and prove its security under the strongest security model where the Type I/II adversary is a super Type I/II adversary.


Sign in / Sign up

Export Citation Format

Share Document