On the security of an identity-based signature scheme

被引:0
|
作者
机构
[1] Yu, Yong
[2] Li, Ji-Guo
[3] Wu, Wei
[4] Huang, Xin-Yi
来源
Huang, X.-Y. (xyhuang81@gmail.com) | 1600年 / Science Press卷 / 37期
关键词
Authentication - Electronic document identification systems - Cryptography - Security systems;
D O I
10.3724/SP.J.1016.2014.01025
中图分类号
学科分类号
摘要
An identity-based signature is an important cryptographic primitive which can realize the functionality of signing in identity-based cryptography and can also simplify the key management procedures including the generation, management and revocation of digital certificates in the traditional digital signatures. The first identity-based signature that can be proven secure in the standard model was proposed by Paterson and Schuldt, unfortunately, the scheme suffers from low efficiency in computation and heavy cost in communication. An improvement due to Li and Jiang was given, and the scheme was claimed as being provably secure in the standard model, enjoying shorter signature length and less computation operation. However, in this paper, we demonstrate that the new scheme is insecure against the forgery attack by providing a concrete security analysis in their security model. This attack is due to the universal forgery of the key extraction in their scheme. We also show the flaws in their security proof: the view of the adversary is not independent of the event that the simulation succeeds.
引用
收藏
相关论文
共 50 条
  • [31] IDENTITY-BASED XTR BLIND SIGNATURE SCHEME
    Tang, Qiaoying
    Shen, Fengxian
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2013, 19 (02): : 143 - 149
  • [32] Identity-based signature scheme based on quadratic residues
    ZhenChuan Chai
    ZhenFu Cao
    XiaoLei Dong
    Science in China Series F: Information Sciences, 2007, 50 : 373 - 380
  • [33] Identity-based signature scheme based on quintic residues
    Dong, Xue-Dong
    Gao, Yuan
    PROCEEDINGS OF THE 2ND ANNUAL INTERNATIONAL CONFERENCE ON ELECTRONICS, ELECTRICAL ENGINEERING AND INFORMATION SCIENCE (EEEIS 2016), 2016, 117 : 836 - 841
  • [34] Identity-based signature scheme based on quadratic residues
    Chai ZhenChuan
    Cao ZhenFu
    Dong XiaoLei
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 373 - 380
  • [35] Identity-based signature scheme based on quadratic residues
    CHAI ZhenChuan
    Science in China(Series F:Information Sciences), 2007, (03) : 373 - 380
  • [36] Security Proofs for Identity-Based Identification and Signature Schemes
    Bellare, Mihir
    Namprempre, Chanathip
    Neven, Gregory
    JOURNAL OF CRYPTOLOGY, 2009, 22 (01) : 1 - 61
  • [37] Security Proofs for Identity-Based Identification and Signature Schemes
    Mihir Bellare
    Chanathip Namprempre
    Gregory Neven
    Journal of Cryptology, 2009, 22 : 1 - 61
  • [38] Security proofs for identity-based identification and signature schemes
    Bellare, M
    Namprempre, C
    Neven, G
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 268 - 286
  • [39] Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme
    Behnia, Rouzbeh
    Tan, Syh-Yuan
    Heng, Swee-Huay
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 474 - 477
  • [40] An identity-based proxy signature scheme from pairings
    Shim, Kyung-Ah
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71