Abstract
The paper discusses the correctness of Lee, Hwang and Wang’s comments on on Zhang’s proxy signature schemes. In particular, it is shown that the cheating attack proposed by Lee, Hwang and Wang can be detected by the owner of the signature scheme. It is argued that considering the context in which proxy signatures are used, the attack is not a security problem. The work is concluded by a discussion about the non-repudiation controversy incorrectly observed by Lee, Hwang and Wang.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Trans. on Inform. Theory, vol. IT-31, pp. 469–472, July 1985.
K. Nyberg and R. Rueppel, “A New Signature Scheme Based on the DSA Giving Message Recovery,” in Proceedings of 1st ACM Conference on Computer and Communications Security, 1993.
K. Zhang, “Threshold Proxy Signature Scheme,” 1997 Information Security Workshop, Japan, pp. 191–197, 1997.
K. Zhang, Nonrepudiable Proxy Signature Scheme. Manuscript, 1997.
N. Lee, T. Hwang, and C. Wang, “On Zhang’s Nonrepudiable Proxy Signature Scheme,” in Proceedings of ACISP’ 98-Australasian Conference on Information Security and Privacy (C. Boyd and E. Dawson, eds.), vol. 1438 of Lecture Notes in Computer Science, pp. 415–422, Springer-Verlag (Berlin), 1998.
M. Mambo, K. Usuda, and E. Okamoto, “Proxy Signatures: Delegation of the Power to Sign Messages,” IEICE Trans. Fundamentals, vol. E79-A, pp. 1338–1354, Sept. 1996. also, “Proxy Signatures for Delegating Signing Operation” In Proc. 3rd ACM Conference on Computer and Communications Security, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ghodosi, H., Pieprzyk, J. (1999). Repudiation of Cheating and Non-repudiation of Zhang’s Proxy Signature Schemes. In: Pieprzyk, J., Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 1999. Lecture Notes in Computer Science, vol 1587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48970-3_11
Download citation
DOI: https://doi.org/10.1007/3-540-48970-3_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65756-9
Online ISBN: 978-3-540-48970-2
eBook Packages: Springer Book Archive