10 research outputs found

    Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme

    Get PDF
    An identity-based multi-proxy signature is a type of proxy signatures in which the delegation of signing right is distributed among a number of proxy signers. In this type of cryptographic primitive, cooperation of all proxy signers in the proxy group generates the proxy signatures of roughly the same size as that of standard proxy signatures on behalf of the original signer, which is more efficient than transmitting individual proxy signatures. Since identity-based multi-proxy signatures are useful in distributed systems, grid computing, presenting a provably secure identity-based multi-proxy scheme is desired. In 2013, Sahu and Padhye proposed the first provably secure identity-based multi-proxy signature scheme in the random oracle model, and proved that their scheme is existential unforgeable against adaptive chosen message and identity attack. Unfortunately, in this paper, we show that their scheme is insecure. We present two forgery attacks on their scheme. Furthermore, their scheme is not resistant against proxy key exposure attack. As a consequence, there is no provably secure identity-based multi-proxy signature scheme secure against proxy key exposure attack to date

    Texas Law Review

    Get PDF
    Journal containing articles, notes, book reviews, and other analyses of law and legal cases

    Negotiating Federalism: State Bargaining and the Dormant Treaty Power

    Get PDF
    The orthodox view that states have no role in U. S. foreign relations is not only inconsistent with their place in the modern global economy, but the constitutional basis for a dormant bar on state participation-that is, absent a controlling federal statute or treaty-is obscure. Revisionist scholarship and recent Supreme Court case law suggest that Congress alone should decide when the states must stay out of foreign relations. In this Article, Professor Swaine argues that both the orthodox and revisionist views neglect an alternative basis for a judicial role-the Treaty Clause, enforced through the dormant treaty power. The text, structure, and original understanding of the treaty power establish two important principles of continuing validity. First, the President was to have an independent and substantive authority to negotiate on behalf of the United States, the better to secure advantageous treaties and avoid perilous entanglements. Second, state interference with this negotiating authority, even prior to the conclusive adoption of a federal treaty or statute, was unlawful. Treaty Clause exclusivity is best maintained by a judicially enforced dormant treaty power barring the states from bargaining with foreign powers, including indirect bargaining through measures that are contingent on foreign government policies-such as the Massachusetts law targeting companies doing business with Burma. However, state activities that incidentally have effects overseas would not be precluded, and the jurisprudence must be informed by the original rationales for federal exclusivity and by the President\u27s discretion to exempt state activities posing no threat to federal functions

    Early United States Political Thought

    Get PDF
    Openly licensed anthology focused on the theme of the Early United States Political Thought. Contains: The Federalist Papers, The Anti-Federalist Papers, Constitutional Convention Debates Vol. I and II, A Report of the Debates and Proceedings in the Secret Sessions of the Conference Convention
    corecore