On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model

Ying SUN  Yong YU  Xiaosong ZHANG  Jiwen CHAI  

Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E96-A   No.3   pp.721-723
Publication Date: 2013/03/01
Online ISSN: 1745-1337
DOI: 10.1587/transfun.E96.A.721
Print ISSN: 0916-8508
Type of Manuscript: LETTER
Category: Cryptography and Information Security
Keyword: 
proxy signature,  identity-based cryptography,  standard model,  

Full Text: PDF(72.6KB)>>
Buy this Article




Summary: 
Observing the security of existing identity-based proxy signature schemes was proven in the random oracle model, Cao et al. proposed the first direct construction of identity-based proxy signature secure in the standard model by making use of the identity-based signature due to Paterson and Schuldt. They also provided a security proof to show their construction is secure against forgery attacks without resorting to the random oracles. Unfortunately, in this letter, we demonstrate that their scheme is vulnerable to insider attacks. Specifically, after a private-key extraction query, an adversary, behaving as a malicious original signer or a malicious proxy signer, is able to violate the unforgeability of the scheme.