Cryptology ePrint Archive: Report 2003/263
Security Analysis of Lal and Awasthi's Proxy Signature Schemes
Manik Lal Das and Ashutosh Saxena and V P Gulati
Abstract: In this paper, we analyze two proxy signatures scheme [1], [2] proposed by Lal and Awasthi and found that both the schemes suffer with the security flaws. The scheme [1] suffers with proxy signer's forgery attacks and misuse of original signer's delegated information. The other scheme [2] suffers with original signer's forgery attack, proxy signer's undeniability and misuse of delegated information.
Category / Keywords: public-key cryptography / proxy signature, delegation, warrant, forgery attacks
Date: received 23 Dec 2003
Contact author: mldas at idrbt ac in
Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation
Version: 20040101:175311 (All versions of this report)
Short URL: ia.cr/2003/263
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]