Abstract
Securing different online e-business activities usually requires applying different cryptographic algorithms. The proxy signcryption algorithms are designed for applications such as online proxy auction or online proxy signatures on business contracts, which require a proxy agent to sign on confidential messages. This paper proposes a proxy credential forgery attack to two recent proxy signcryption schemes in the literature. Using the attack, a malicious proxy signer can create a fake proxy credential from his original credential to extend his signing power. Simple modifications to these two schemes are also provided in this paper to prevent the attack without adding too much computational complexity. In addition to the contribution of introducing a new type of attacks to signcryption schemes, the paper also points out that, while designing a secure proxy signcryption scheme, not only the unforgeability of proxy signatures is important, but also that of proxy credentials as well.
| Original language | English |
|---|---|
| Pages (from-to) | 1100-1119 |
| Number of pages | 20 |
| Journal | Journal of Supercomputing |
| Volume | 70 |
| Issue number | 3 |
| DOIs | |
| State | Published - Dec 2014 |
Keywords
- Bilinear pairings
- Proxy credential forgery attack
- Proxy signcryption
Fingerprint
Dive into the research topics of 'The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver