You are looking at a specific version 20040101:175311 of this paper. See the latest version.

Paper 2003/263

Security Analysis of Lal and Awasthi's Proxy Signature Schemes

Manik Lal Das and Ashutosh Saxena and V P Gulati

Abstract

In this paper, we analyze two proxy signatures scheme [1], [2] proposed by Lal and Awasthi and found that both the schemes suffer with the security flaws. The scheme [1] suffers with proxy signer's forgery attacks and misuse of original signer's delegated information. The other scheme [2] suffers with original signer's forgery attack, proxy signer's undeniability and misuse of delegated information.

Metadata
Available format(s)
PDF PS
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
proxy signaturedelegationwarrantforgery attacks
Contact author(s)
mldas @ idrbt ac in
History
2004-01-01: received
Short URL
https://ia.cr/2003/263
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.