General Information
    • ISSN: 1793-8201 (Print), 2972-4511 (Online)
    • Abbreviated Title: Int. J. Comput. Theory Eng.
    • Frequency: Quarterly
    • DOI: 10.7763/IJCTE
    • Editor-in-Chief: Prof. Mehmet Sahinoglu
    • Associate Editor-in-Chief: Assoc. Prof. Alberto Arteta, Assoc. Prof. Engin Maşazade
    • Managing Editor: Ms. Mia Hu
    • Abstracting/Indexing: Scopus (Since 2022), INSPEC (IET), CNKI,  Google Scholar, EBSCO, etc.
    • Average Days from Submission to Acceptance: 192 days
    • E-mail: ijcte@iacsitp.com
    • Journal Metrics:

    • SCImago Journal & Country Rank
Editor-in-chief
Prof. Mehmet Sahinoglu
Computer Science Department, Troy University, USA
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.

IJCTE 2013 Vol.5(5): 820-822 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2013.V5.804

Cryptanalysis of Lu et al.'s Proxy Blind Multi Signature Scheme

Swati Verma and Birendra Kumar Sharma

Abstract—As a variation of ordinary digital signature scheme, a proxy signature scheme able a proxy signer to sign messages on behalf of the original signer. Proxy multi-signature is an extension of the basic proxy signature primitive and permits two or more entities to delegate their signing capabilities to the same other entity. In proxy multi-signature, many original signers can delegate their signing power to a proxy signer in such a way that the proxy signer can sign any message on behalf of original signers. In blind signature, the signer cannot make a linkage between the blind signature and the identity of the requester. Proxy blind multi-signature is the combination of proxy multi-signature and blind signature. Recently, Lu et al. presented a proxy blind multi-signature scheme which did not need a secure channel. However, in this paper, we show that Lu et al.'s scheme does not satisfy the unforgeability and also shown that their scheme is not secure against the original signer's forgery attack and the proxy signer's forgery attacks.

Index Terms—Blind signature, proxy-multi signature, proxy blind multi signature, security.

The authors are with the School of Studies in Mathematics Pt. Ravishankar Shukla University, Raipur (C.G.), India (e-mail: swativerma15@gmail.com, sharmabk07@gmail.com).

[PDF]

Cite:Swati Verma and Birendra Kumar Sharma, "Cryptanalysis of Lu et al.'s Proxy Blind Multi Signature Scheme," International Journal of Computer Theory and Engineering vol. 5, no. 5, pp. 820-822, 2013.


Copyright © 2008-2024. International Association of Computer Science and Information Technology. All rights reserved.