Full Text

Turn on search term navigation

Copyright © 2013 Wenbo Shi et al. Wenbo Shi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. It has lots of practical applications in distributed systems, grid computing, mobile agent applications, distributed shared object systems, global distribution networks, and mobile communications. Recently, Padhye et al. proposed a certificateless proxy signature scheme with message recovery and claimed the scheme is secure against both of the two types of adversaries. However, in this paper, we will show that Padhye et al.'s scheme is not secure against the Type I adversary. The analysis shows their scheme is not secure for practical applications.

Details

Title
On the Security of a Certificateless Proxy Signature Scheme with Message Recovery
Author
Shi, Wenbo; He, Debiao; Gong, Peng
Publication year
2013
Publication date
2013
Publisher
John Wiley & Sons, Inc.
ISSN
1024123X
e-ISSN
15635147
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
1428035612
Copyright
Copyright © 2013 Wenbo Shi et al. Wenbo Shi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.