Download now Free registration required
Recently, Kim et al.'s proposed a new type of proxy signature scheme, called self proxy signature scheme. In their scheme, a signer, delegates his/her signing capability to himself/herself and uses the proxy private/public key pair as temporary keys. In this paper, the authors will demonstrate some security leaks inherent in Kim et al.'s scheme and show that an adversary can forge a valid self proxy signature for any message by using different ways. Finally, they will propose an improvement to eliminate the pointed out security leaks.
- Format: PDF
- Size: 123.88 KB