The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

Securing different online e-business activities usually requires applying different cryptographic algorithms. The proxy signcryption algorithms are designed for applications such as online proxy auction or online proxy signatures on business contracts, which require a proxy agent to sign on confidential messages. This paper proposes a proxy credential forgery attack to two recent proxy signcryption schemes in the literature. Using the attack, a malicious proxy signer can create a fake proxy credential from his original credential to extend his signing power. Simple modifications to these two schemes are also provided in this paper to prevent the attack without adding too much computational complexity. In addition to the contribution of introducing a new type of attacks to signcryption schemes, the paper also points out that, while designing a secure proxy signcryption scheme, not only the unforgeability of proxy signatures is important, but also that of proxy credentials as well.

Original languageEnglish
Pages (from-to)1100-1119
Number of pages20
JournalJournal of Supercomputing
Volume70
Issue number3
DOIs
StatePublished - Dec 2014

Keywords

  • Bilinear pairings
  • Proxy credential forgery attack
  • Proxy signcryption

Fingerprint

Dive into the research topics of 'The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it'. Together they form a unique fingerprint.

Cite this