CryptoDB
Security Analysis of Lal and Awasthi's Proxy Signature Schemes
Authors: | |
---|---|
Download: | |
Abstract: | In this paper, we analyze two proxy signatures scheme [1], [2] proposed by Lal and Awasthi and found that both the schemes suffer with the security flaws. The scheme [1] suffers with proxy signer's forgery attacks and misuse of original signer's delegated information. The other scheme [2] suffers with original signer's forgery attack, proxy signer's undeniability and misuse of delegated information. |
BibTeX
@misc{eprint-2003-11975, title={Security Analysis of Lal and Awasthi's Proxy Signature Schemes}, booktitle={IACR Eprint archive}, keywords={public-key cryptography / proxy signature, delegation, warrant, forgery attacks}, url={http://eprint.iacr.org/2003/263}, note={ mldas@idrbt.ac.in 12410 received 23 Dec 2003}, author={Manik Lal Das and Ashutosh Saxena and V P Gulati}, year=2003 }