On the security of an identity-based signature scheme

被引:0
|
作者
机构
[1] Yu, Yong
[2] Li, Ji-Guo
[3] Wu, Wei
[4] Huang, Xin-Yi
来源
Huang, X.-Y. (xyhuang81@gmail.com) | 1600年 / Science Press卷 / 37期
关键词
Authentication - Electronic document identification systems - Cryptography - Security systems;
D O I
10.3724/SP.J.1016.2014.01025
中图分类号
学科分类号
摘要
An identity-based signature is an important cryptographic primitive which can realize the functionality of signing in identity-based cryptography and can also simplify the key management procedures including the generation, management and revocation of digital certificates in the traditional digital signatures. The first identity-based signature that can be proven secure in the standard model was proposed by Paterson and Schuldt, unfortunately, the scheme suffers from low efficiency in computation and heavy cost in communication. An improvement due to Li and Jiang was given, and the scheme was claimed as being provably secure in the standard model, enjoying shorter signature length and less computation operation. However, in this paper, we demonstrate that the new scheme is insecure against the forgery attack by providing a concrete security analysis in their security model. This attack is due to the universal forgery of the key extraction in their scheme. We also show the flaws in their security proof: the view of the adversary is not independent of the event that the simulation succeeds.
引用
收藏
相关论文
共 50 条
  • [21] Identity-Based Secret Signature Scheme
    Lee, Byoungcheon
    Li, Jin
    Kim, Kwangjo
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1080 - +
  • [22] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [23] On the Security of an Improved Identity-based Proxy Signature Scheme without Random Oracles
    Zhou, Caixue
    Cui, Zongmin
    Gao, Guangyong
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (07): : 2057 - 2068
  • [24] Identity-based authenticated blind signature scheme
    Department of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 20009, China
    不详
    Jisuanji Gongcheng, 2006, 14 (136-137):
  • [25] Identity-Based Linkable Ring Signature Scheme
    Deng, Lunzhi
    Jiang, Yuhong
    Ning, Bingqin
    IEEE ACCESS, 2019, 7 : 153969 - 153976
  • [26] A new identity-based group signature scheme
    Cheng, Xiangguo
    Guo, Lifeng
    Yu, Jia
    Ma, Huiran
    Wu, Yuexiu
    International Journal of Computers and Applications, 2013, 35 (01) : 1 - 5
  • [27] An identity-based signature scheme for mobile business
    Wang, Maocai
    Hu, Hanping
    Dai, Guangming
    ICIC Express Letters, 2010, 4 (02): : 565 - 569
  • [28] Comments on an identity-based signature scheme for VANETs
    Song, Yaqing
    Xu, Chunxiang
    Zhang, Yuan
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 112
  • [29] A new blind identity-based signature scheme
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    2007 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS: ICCES '07, 2007, : 114 - 119
  • [30] A new blind identity-based signature scheme
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1102 - 1106