English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90429/105609 (86%)
Visitors : 10296555      Online Users : 459
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 光電與通訊學系 > 期刊論文 >  Item 310904400/101615

    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/101615

    Title: Cryptanalysis and Improvement of A Proxy Signature With Message Recovery Using Self-certified Public Key
    Authors: Manoj Kumar Chande;李正吉;LeeCheng-Chi Lee;*
    Contributors: 光電與通訊學系
    Date: 2016-08
    Issue Date: 2016-11-08 10:17:05 (UTC+8)
    Abstract: Combining the concept of self-certified public key and message
    recovery, Li-Zhang-Zhu (LZZ) gives the proxy signature scheme with
    message recovery using self-certified public key. The security of the proposed
    scheme is based on the discrete logarithm problem (DLP) and
    one-way hash function (OWHF). Their scheme accomplishes the tasks of
    public key verification, proxy signature verification, and message recovery
    in a logically single step. In addition, their scheme satisfies all properties
    of strong proxy signature and does not use secure channel in the communication
    between the original signer and the proxy signer. In this paper,
    it is shown that in their signature scheme a malicious signer can cheat
    the system authority (SA), by obtaining a proxy signature key without
    the permission of the original signer. At the same time malicious original
    signer can also cheat the SA, he can also obtain a proxy signature
    key without the permission of the proxy signer. An improved signature
    scheme is being proposed, which involves the remedial measures to get
    rid of security flaws of the LZZ et al.’s. The security and performance
    analysis shows that the proposed signature scheme is maintaining higher
    level of security, with little bit of computational complexity.
    Relation: Bulletin of the Korean Mathematical Society
    Appears in Collections:[光電與通訊學系] 期刊論文

    Files in This Item:

    File SizeFormat

    All items in ASIAIR are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback