On the security of a certificateless proxy signature scheme with message recovery

  • Wenbo Shi*
  • , Debiao He
  • , Peng Gong
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)

Abstract

A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. It has lots of practical applications in distributed systems, grid computing, mobile agent applications, distributed shared object systems, global distribution networks, and mobile communications. Recently, Padhye et al. proposed a certificateless proxy signature scheme with message recovery and claimed the scheme is secure against both of the two types of adversaries. However, in this paper, we will show that Padhye et al.'s scheme is not secure against the Type I adversary. The analysis shows their scheme is not secure for practical applications.

Original languageEnglish
Article number761694
JournalMathematical Problems in Engineering
Volume2013
DOIs
Publication statusPublished - 2013

Fingerprint

Dive into the research topics of 'On the security of a certificateless proxy signature scheme with message recovery'. Together they form a unique fingerprint.

Cite this