On the security of an identity based multi-proxy signature scheme

In a multi-proxy signature scheme, an original signer could authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signatures on behalf of the original signer. Recently, Cao and Cao gave the first formal definition and security model of an identity-based multi-proxy signature scheme, then proposed an identity-based multi-proxy signature scheme from bilinear pairings and proved its security in their security model. Although they proved that their scheme is secure under this model, we disprove their claim and show that their scheme is not secure. We also present a simple fix to prevent this attack.

[1]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[2]  Zhenfu Cao,et al.  A secure identity-based multi-proxy signature scheme , 2009, Comput. Electr. Eng..

[3]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[4]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[5]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[6]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[7]  Bogdan Warinschi,et al.  Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.

[8]  Byoungcheon Lee,et al.  Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.

[9]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[10]  Jean-Jacques Quisquater,et al.  A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge , 1988, CRYPTO.

[11]  Satoshi Obana,et al.  The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures , 2004, EUROCRYPT.

[12]  Kefei Chen,et al.  Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings , 2004, PDCAT.

[13]  Basel Alomair,et al.  Efficient Generic Forward-Secure Signatures and Proxy Signatures , 2008, EuroPKI.

[14]  Chanathip Namprempre,et al.  Security Proofs for Identity-Based Identification and Signature Schemes , 2008, Journal of Cryptology.

[15]  Kefei Chen,et al.  ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings , 2005, Appl. Math. Comput..

[16]  Jean-Jacques Quisquater,et al.  The Exact Security of an Identity Based Signature and its Applications , 2004, IACR Cryptol. ePrint Arch..

[17]  Tsz Hon Yuen,et al.  Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant , 2006, 2006 International Conference on Computational Intelligence and Security.

[18]  Kan Zhang,et al.  Threshold Proxy Signature Schemes , 1997, ISW.

[19]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.