On the security of an ID-based anonymous proxy signature scheme and its improved scheme

As an important delegation technique, proxy signature was introduced in 1996 by Mambo, Usuda, and Okamoto. And many variants of proxy signature schemes have been proposed. In some cases, to protect privacy of proxy signer, the identity of proxy signer is hidden. Recently, to satisfy the requirement of proxy signer’s privacy protection, Hu et al. gave an enhanced ID-based anonymous proxy signature scheme from pairings, in which it allows that proxy signature produces an anonymous signature on behalf of original signer, and the identity of proxy signer is hidden. Meanwhile, it also allows the original signer to trace the actual identity of proxy signer. Unfortunately, in this paper, by analysing the scheme, we show that the scheme is insecure. It is universally forgeable, namely, anyone can produce an anonymous proxy signature on an arbitrary message. And the original signer can not also trace the actual identity of proxy signer. Finally, we give the corresponding attacks on the scheme and the reasons to pr...

[1]  Herbert Bos,et al.  Safe execution of untrusted applications on embedded network processors , 2008, Int. J. Embed. Syst..

[2]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[3]  Bao Li,et al.  Universally composable zero-knowledge sets , 2012, Int. J. Grid Util. Comput..

[4]  Michael W. Marcellin,et al.  JPEG2000 - image compression fundamentals, standards and practice , 2002, The Kluwer International Series in Engineering and Computer Science.

[5]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1992 .

[6]  Jianhong Zhang,et al.  SPA : Self-certified PKC-based Privacy-preserving Authentication Protocol for Vehicular Ad Hoc Networks , 2012 .

[7]  Chengyu Hu,et al.  An enhanced ID-Based anonymous proxy signature scheme on pairings , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).

[8]  Haibo Tian A new strong multiple designated verifiers signature , 2012, Int. J. Grid Util. Comput..

[9]  P. N. Tudor MPEG-2 video compression , 1995 .

[10]  Yue Wang,et al.  A new proxy blind signature scheme , 2012, Int. J. Grid Util. Comput..

[11]  Victor K.-W. Wei,et al.  A strong proxy signature scheme with proxy signer privacy protection , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[12]  Yang Yi-xian A Anonymous Proxy Signature Scheme without a Trusted Party , 2005 .

[13]  Joseph Zambreno,et al.  Reconfigurable hardware implementation of a modified chaotic filter bank scheme , 2010, Int. J. Embed. Syst..

[14]  Michael W. Marcellin,et al.  JPEG2000 - image compression fundamentals, standards and practice , 2013, The Kluwer international series in engineering and computer science.

[15]  Zixiang Xiong,et al.  Three-dimensional embedded subband coding with optimized truncation , 2001 .

[16]  Wenchao Jiang,et al.  A novel service scheduling policy based on logical subnet partitioning in Bio-Grid environments , 2011, Int. J. Grid Util. Comput..

[17]  Bin Li,et al.  An ID-based Anonymous Proxy Signature From Bilinear Pairings , 2006, Security and Management.

[18]  David S. Taubman,et al.  High performance scalable image compression with EBCOT , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[19]  Zixiang Xiong,et al.  Memory-constrained 3D wavelet transform for video coding without boundary effects , 2002, IEEE Trans. Circuits Syst. Video Technol..

[20]  Jianhong Zhang,et al.  On the Security of a Proxy Ring Signature with Revocable Anonymity , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[21]  Jianhong Zhang,et al.  On the Security of an Enhanced ID-Based Anonymous Proxy Signature Scheme in ICCAE2010 , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[22]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[23]  David L. Neuhoff,et al.  Quantization (invited paper) , 2000 .

[24]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[25]  Gary J. Sullivan,et al.  Video Compression - From Concepts to the H.264/AVC Standard , 2005, Proceedings of the IEEE.