Designated Verifier Proxy Signature Scheme with Multi-warrant in the Standard Model

2013 ◽  
Vol 10 (7) ◽  
pp. 2097-2107 ◽  
Author(s):  
Yang Ming
2012 ◽  
Vol 2012 ◽  
pp. 1-6 ◽  
Author(s):  
Baoyuan Kang

In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the original signer. But only the designated verifier can verify the proxy signature. Several designated verifier proxy signature schemes have been proposed. However, most of them were proven secure in the random oracle model, which has received a lot of criticism since the security proofs in the random oracle model are not sound with respect to the standard model. Recently, by employing Water's hashing technique, Yu et al. proposed a new construction of designated verifier proxy signature. They claimed that the new construction is the first designated verifier proxy signature, whose security does not rely on the random oracles. But, in this paper, we will show some attacks on Yu et al.'s scheme. So, their scheme is not secure.


2011 ◽  
Vol 34 (3) ◽  
pp. 494-501 ◽  
Author(s):  
Zhenhua Liu ◽  
Yupu Hu ◽  
Xiangsong Zhang ◽  
Hua Ma

2016 ◽  
Vol 25 (1) ◽  
pp. 93-99 ◽  
Author(s):  
Ke Gu ◽  
Weijia Jia ◽  
Xiaoyi Nie ◽  
Yueming Deng

2011 ◽  
Vol 84 (9) ◽  
pp. 1471-1479 ◽  
Author(s):  
Ying Sun ◽  
Chunxiang Xu ◽  
Yong Yu ◽  
Yi Mu

Sign in / Sign up

Export Citation Format

Share Document