Security Analysis of a Proxy Signature Scheme over Braid Groups

Delegation of powers is a common practice in the real world. To realized the delegation of powers electronically,Mambo,Usuda and Okamoto proposed the first proxy signature scheme in 1996. Since then a number of new schemes and their improvements have been proposed. In 2008, Verma proposed a proxy signature scheme over braid groups. This paper analyzes Verma’s scheme and found that this scheme suffers with the serious security flaws. In this scheme,the proxy signer is able to misuse his delegated signing capabilities and the original signer can not restrict the proxy signer for misuse her delegation power. As a result, the proposed scheme does not satisfy some essential security requirements. Verma’s proposed scheme is also not secure against the original signer and proxy singer changing attacks. Thus, the proposed scheme is not only insecure against the attacks by original signer and proxy signer but also has pitfalls against the forgery attacks mounted by any antagonist.

[1]  Jinxiang Dong,et al.  A privacy-protecting proxy signature scheme and its application , 2004, ACM-SE 42.

[2]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[3]  Robert H. Deng,et al.  Security Analysis of Some Proxy Signatures , 2003, ICISC.

[4]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[5]  Hugh R. Morton,et al.  ALGORITHMS FOR POSITIVE BRAIDS , 1994 .

[6]  Sangjin Lee,et al.  Pseudorandomness from Braid Groups , 2001, CRYPTO.

[7]  Kan Zhang,et al.  Threshold Proxy Signature Schemes , 1997, ISW.

[8]  Zhenfu Cao,et al.  Proxy signature scheme using self-certified public keys , 2004, Appl. Math. Comput..

[9]  Girraj Kumar Verma A Proxy Signature Scheme over Braid Groups , 2008, IACR Cryptol. ePrint Arch..

[10]  Mingsheng Wang,et al.  On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes , 2005, ISPEC.

[11]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[12]  Jung Hee Cheon,et al.  New Public-Key Cryptosystem Using Braid Groups , 2000, CRYPTO.

[13]  Joan S. Birman,et al.  A new approach to the word and conjugacy problems in the braid groups , 1997 .

[14]  Min-Shiang Hwang,et al.  Generalization of proxy signature-based on discrete logarithms , 2003, Comput. Secur..

[15]  Bogdan Warinschi,et al.  Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.

[16]  Dennis Hofheinz,et al.  A Practical Attack on Some Braid Group Based Cryptographic Primitives , 2003, Public Key Cryptography.

[17]  F. A. Garside,et al.  THE BRAID GROUP AND OTHER GROUPS , 1969 .

[18]  Jang-Won Lee,et al.  New Signature Scheme Using Conjugacy Problem , 2002, IACR Cryptol. ePrint Arch..

[19]  Jung Hee Cheon,et al.  An Efficient Implementation of Braid Groups , 2001, ASIACRYPT.

[20]  E. Artin The theory of braids. , 1950, American scientist.

[21]  J. Birman Braids, Links, and Mapping Class Groups. , 1975 .

[22]  Robert H. Deng,et al.  Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2004, IACR Cryptol. ePrint Arch..

[23]  Hung-Min Sun,et al.  On the Security of Some Proxy Signature Schemes , 2003, IACR Cryptol. ePrint Arch..