Paper 2003/263
Security Analysis of Lal and Awasthi's Proxy Signature Schemes
Manik Lal Das, Ashutosh Saxena, and V P Gulati
Abstract
In this paper, we analyze two proxy signatures scheme [1], [2] proposed by Lal and Awasthi and found that both the schemes suffer with the security flaws. The scheme [1] suffers with proxy signer's forgery attacks and misuse of original signer's delegated information. The other scheme [2] suffers with original signer's forgery attack, proxy signer's undeniability and misuse of delegated information.
Metadata
- Available format(s)
- PDF PS
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- proxy signaturedelegationwarrantforgery attacks
- Contact author(s)
- mldas @ idrbt ac in
- History
- 2004-01-01: received
- Short URL
- https://ia.cr/2003/263
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2003/263, author = {Manik Lal Das and Ashutosh Saxena and V P Gulati}, title = {Security Analysis of Lal and Awasthi's Proxy Signature Schemes}, howpublished = {Cryptology {ePrint} Archive, Paper 2003/263}, year = {2003}, url = {https://eprint.iacr.org/2003/263} }