Repudiation of cheating and non-repudiation of Zhang’s proxy signature schemes

Hossein Ghodosi, Josef Pieprzyk

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

10 Citations (Scopus)

Abstract

The paper discusses the correctness of Lee, Hwang and Wang’s comments on on Zhang’s proxy signature schemes. In particular, it is shown that the cheating attack proposed by Lee, Hwang and Wang can be detected by the owner of the signature scheme. It is argued that considering the context in which proxy signatures are used, the attack is not a security problem. The work is concluded by a discussion about the non-repudiation controversy incorrectly observed by Lee, Hwang and Wang.

Original languageEnglish
Title of host publicationInformation Security and Privacy
Subtitle of host publication4th Australasian Conference, ACISP’99 Wollongong, NSW, Australia, April 7–9, 1999 Proceedings
EditorsJosef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry
Place of PublicationBerlin; New York
PublisherSpringer, Springer Nature
Pages129-134
Number of pages6
ISBN (Electronic)9783540489702
ISBN (Print)3540657568, 9783540657569
DOIs
Publication statusPublished - Apr 1999
Externally publishedYes
Event4th Australasian Conference on Information Security and Privacy, ACISP - 1999 - Wollongong, Australia
Duration: 7 Apr 19999 Apr 1999

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1587
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other4th Australasian Conference on Information Security and Privacy, ACISP - 1999
Country/TerritoryAustralia
CityWollongong
Period7/04/999/04/99

Keywords

  • Cryptography
  • Digital Signatures
  • ElGa-mal signatures
  • Proxy Signatures

Fingerprint

Dive into the research topics of 'Repudiation of cheating and non-repudiation of Zhang’s proxy signature schemes'. Together they form a unique fingerprint.

Cite this