• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Nov 09, 2017 News!Vol.9, No.5 has been published with online version. 16 peer reviewed articles from 11 specific areas are published in this issue.   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2013 Vol.5(5): 820-822 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2013.V5.804

Cryptanalysis of Lu et al.'s Proxy Blind Multi Signature Scheme

Swati Verma and Birendra Kumar Sharma
Abstract—As a variation of ordinary digital signature scheme, a proxy signature scheme able a proxy signer to sign messages on behalf of the original signer. Proxy multi-signature is an extension of the basic proxy signature primitive and permits two or more entities to delegate their signing capabilities to the same other entity. In proxy multi-signature, many original signers can delegate their signing power to a proxy signer in such a way that the proxy signer can sign any message on behalf of original signers. In blind signature, the signer cannot make a linkage between the blind signature and the identity of the requester. Proxy blind multi-signature is the combination of proxy multi-signature and blind signature. Recently, Lu et al. presented a proxy blind multi-signature scheme which did not need a secure channel. However, in this paper, we show that Lu et al.'s scheme does not satisfy the unforgeability and also shown that their scheme is not secure against the original signer's forgery attack and the proxy signer's forgery attacks.

Index Terms—Blind signature, proxy-multi signature, proxy blind multi signature, security.

The authors are with the School of Studies in Mathematics Pt. Ravishankar Shukla University, Raipur (C.G.), India (e-mail: swativerma15@gmail.com, sharmabk07@gmail.com).

[PDF]

Cite:Swati Verma and Birendra Kumar Sharma, "Cryptanalysis of Lu et al.'s Proxy Blind Multi Signature Scheme," International Journal of Computer Theory and Engineering vol. 5, no. 5, pp. 820-822, 2013.

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com