• Mar 27, 2019 News!Vol.11, No.2 has been published with online version.   [Click]
  • Aug 06, 2018 News!Vol.9, No.1-Vol.9, No.4 have been indexed by EI (Inspec).   [Click]
  • Mar 27, 2019 News!Vol.9, No.1-Vol. 10, No. 6 have been indexed by Crossref.
General Information
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2013 Vol.5(5): 820-822 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2013.V5.804

Cryptanalysis of Lu et al.'s Proxy Blind Multi Signature Scheme

Swati Verma and Birendra Kumar Sharma
Abstract—As a variation of ordinary digital signature scheme, a proxy signature scheme able a proxy signer to sign messages on behalf of the original signer. Proxy multi-signature is an extension of the basic proxy signature primitive and permits two or more entities to delegate their signing capabilities to the same other entity. In proxy multi-signature, many original signers can delegate their signing power to a proxy signer in such a way that the proxy signer can sign any message on behalf of original signers. In blind signature, the signer cannot make a linkage between the blind signature and the identity of the requester. Proxy blind multi-signature is the combination of proxy multi-signature and blind signature. Recently, Lu et al. presented a proxy blind multi-signature scheme which did not need a secure channel. However, in this paper, we show that Lu et al.'s scheme does not satisfy the unforgeability and also shown that their scheme is not secure against the original signer's forgery attack and the proxy signer's forgery attacks.

Index Terms—Blind signature, proxy-multi signature, proxy blind multi signature, security.

The authors are with the School of Studies in Mathematics Pt. Ravishankar Shukla University, Raipur (C.G.), India (e-mail: swativerma15@gmail.com, sharmabk07@gmail.com).


Cite:Swati Verma and Birendra Kumar Sharma, "Cryptanalysis of Lu et al.'s Proxy Blind Multi Signature Scheme," International Journal of Computer Theory and Engineering vol. 5, no. 5, pp. 820-822, 2013.

Copyright © 2008-2019. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@iacsitp.com