Computer Science ›› 2006, Vol. 33 ›› Issue (8): 128-129.

Previous Articles     Next Articles

MING Yang ,WANG Yu-Min (State Key Lab. of Integrated Service Networks, Xidian Univ. Xi'an 710071)   

  • Online:2018-11-17 Published:2018-11-17

Abstract: Recently, Dai et al. propose a designated-receiver proxy signature scheme and a proxy signature scheme with privacy protection. In this paper, we give security analysis of the two proxy signature schemes. The schemes are all insecure against the original

Key words: Proxy signature, Forgery attack,Security analysis

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!