Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2012, Article ID 508981, 6 pages
http://dx.doi.org/10.1155/2012/508981
Research Article

Attacks on One Designated Verifier Proxy Signature Scheme

Computer Science and Software Institution, Tianjin Polytechnic University, 399 Binshuixi road, Tianjin 300387, China

Received 5 April 2012; Accepted 5 June 2012

Academic Editor: Debasish Roy

Copyright © 2012 Baoyuan Kang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures: delegation of the power to sign messages,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E79-A, no. 9, pp. 1338–1353, 1996. View at Google Scholar · View at Scopus
  2. M. Jakobsson, K. Sako, and R. Impagliazzo, “Designated verifier proofs and their applications,” in Proceedings of the 15th Annual International Conference on Theory and Application of Cryptographic Techniques (EUROCRYPT '96), vol. 1070 of Lecture Notes in Computer Science, pp. 143–154, May 1996.
  3. J. Z. Dai, X. H. Yang, and J. X. Dong, “Designated-receiver proxy signature scheme for electronic commerce,” in Proceedings of IEEE International Conference on Systems, Man and Cybernetics, vol. 1, pp. 384–389, IEEE Press, October 2003. View at Scopus
  4. G. Wang, “Designated-verifier proxy signatures for e-commerce,” in Proceedings of IEEE International Conference on Multimedia and Expo (ICME '04), vol. 3, pp. 1731–1734, IEEE Press, June 2004. View at Scopus
  5. X. Huang, Y. Mu, W. Susilo, and F. Zhang, “Short designated verifier proxy signature from pairings,” in Proceedings of the International Conference on Embedded and Ubiquitous Computing Workshops (EUC '05), vol. 3823 of Lecture Notes in Computer Science, pp. 835–844, December 2005.
  6. R. X. Lu and Z. F. Cao, “Designated verifier proxy signature scheme with message recovery,” Applied Mathematics and Computation, vol. 169, no. 2, pp. 1237–1246, 2005. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  7. J. Zhang and J. Mao, “A novel ID-based designated verifier signature scheme,” Information Sciences, vol. 178, no. 3, pp. 766–773, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  8. B. Waters, “Efficient identity-based encryption without random oracles,” in Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology (EUROCRYPT '05), vol. 3494 of Lecture Notes in Computer Science, pp. 114–127, Springer, Berlin, Germany, May 2005. View at Scopus
  9. Y. Yu, C. Xu, X. Zhang, and Y. Liao, “Designated verifier proxy signature scheme without random oracles,” Computers and Mathematics with Applications, vol. 57, no. 8, pp. 1352–1364, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus