Cryptology ePrint Archive: Report 2003/263

Security Analysis of Lal and Awasthi's Proxy Signature Schemes

Manik Lal Das and Ashutosh Saxena and V P Gulati

Abstract: In this paper, we analyze two proxy signatures scheme [1], [2] proposed by Lal and Awasthi and found that both the schemes suffer with the security flaws. The scheme [1] suffers with proxy signer's forgery attacks and misuse of original signer's delegated information. The other scheme [2] suffers with original signer's forgery attack, proxy signer's undeniability and misuse of delegated information.

Category / Keywords: public-key cryptography / proxy signature, delegation, warrant, forgery attacks

Date: received 23 Dec 2003

Contact author: mldas at idrbt ac in

Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation

Version: 20040101:175311 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]