TY - JOUR
T1 - The insecurity of two proxy signcryption schemes
T2 - proxy credential forgery attack and how to prevent it
AU - Yeh, Jyh Haw
N1 - Publisher Copyright:
© 2014, Springer Science+Business Media New York.
PY - 2014/12
Y1 - 2014/12
N2 - Securing different online e-business activities usually requires applying different cryptographic algorithms. The proxy signcryption algorithms are designed for applications such as online proxy auction or online proxy signatures on business contracts, which require a proxy agent to sign on confidential messages. This paper proposes a proxy credential forgery attack to two recent proxy signcryption schemes in the literature. Using the attack, a malicious proxy signer can create a fake proxy credential from his original credential to extend his signing power. Simple modifications to these two schemes are also provided in this paper to prevent the attack without adding too much computational complexity. In addition to the contribution of introducing a new type of attacks to signcryption schemes, the paper also points out that, while designing a secure proxy signcryption scheme, not only the unforgeability of proxy signatures is important, but also that of proxy credentials as well.
AB - Securing different online e-business activities usually requires applying different cryptographic algorithms. The proxy signcryption algorithms are designed for applications such as online proxy auction or online proxy signatures on business contracts, which require a proxy agent to sign on confidential messages. This paper proposes a proxy credential forgery attack to two recent proxy signcryption schemes in the literature. Using the attack, a malicious proxy signer can create a fake proxy credential from his original credential to extend his signing power. Simple modifications to these two schemes are also provided in this paper to prevent the attack without adding too much computational complexity. In addition to the contribution of introducing a new type of attacks to signcryption schemes, the paper also points out that, while designing a secure proxy signcryption scheme, not only the unforgeability of proxy signatures is important, but also that of proxy credentials as well.
KW - Bilinear pairings
KW - Proxy credential forgery attack
KW - Proxy signcryption
UR - http://www.scopus.com/inward/record.url?scp=84919877763&partnerID=8YFLogxK
U2 - 10.1007/s11227-014-1134-9
DO - 10.1007/s11227-014-1134-9
M3 - Article
AN - SCOPUS:84919877763
SN - 0920-8542
VL - 70
SP - 1100
EP - 1119
JO - Journal of Supercomputing
JF - Journal of Supercomputing
IS - 3
ER -