Cryptanalysis of two strongly unforgeable identity-based signatures in the standard model

被引:1
|
作者
Yang, Wenjie [1 ,2 ]
Chen, Min-Rong [2 ]
Zeng, Guo-Qiang [3 ]
机构
[1] College of Cyber Security, College of Information Science and Technology, Jinan University, China
[2] School of Computer, South China Normal University, Guangzhou,510631, China
[3] National-Local Joint Engineering Laboratory of Digitalize Electrical Design Technology, Wenzhou University, China
来源
基金
中国国家自然科学基金;
关键词
Cryptography - Electronic document identification systems - Network security;
D O I
10.6633/IJNS.201811.20(6).19
中图分类号
学科分类号
摘要
The strong unforgeability of digital signature means that no attacker can forge a valid signature on a message, even given some previous signatures on the message, which has been widely accepted as a common security requirement. Recently, Tsai et al. and Hung et al. presented an efficient identity-based signature scheme and a revocable identity- based signature scheme, respectively. Meanwhile, they all claimed that their scheme is strongly unforgeable against chosen message attacks. In this paper, we point out that the two schemes cannot meet the requirements of strong unforgeability by giving some concrete attacks and brie y analyze the reasons why the provably-secure schemes are insecure following their security model. © 2018 International Journal of Network Security.
引用
收藏
页码:1194 / 1199
相关论文
共 50 条
  • [1] New strongly unforgeable identity-based signature scheme in the standard model
    Wu, Qing
    Zhang, Le-You
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2011, 34 (03): : 71 - 74
  • [2] Revocable and strongly unforgeable identity-based signature scheme in the standard model
    Liu, Zhenhua
    Zhang, Xiangsong
    Hu, Yupu
    Takagi, Tsuyoshi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2422 - 2433
  • [3] Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures
    Wang, Fuqun
    Wang, Kunpeng
    Li, Bao
    Gao, Yuanyuan
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 42 - 60
  • [4] Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model
    Liu, Zhenhua
    Hu, Yupu
    Zhang, Xiangsong
    Li, Fagen
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 69 - 77
  • [5] Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
    Rueckert, Markus
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2010, 6061 : 182 - 200
  • [6] Identity-based signatures in standard model
    Huiyan Chen
    Chenchen Zhang
    Acta Informatica, 2019, 56 : 471 - 486
  • [7] Identity-based signatures in standard model
    Chen, Huiyan
    Zhang, Chenchen
    ACTA INFORMATICA, 2019, 56 (06) : 471 - 486
  • [8] Efficient identity-based signatures in the standard model
    Narayan, S.
    Parampalli, U.
    IET INFORMATION SECURITY, 2008, 2 (04) : 108 - 118
  • [9] Security analysis of an identity-based strongly unforgeable signature scheme
    Lee, Kwangsu
    Lee, Dong Hoon
    INFORMATION SCIENCES, 2014, 286 : 29 - 34
  • [10] Security Analysis of a Revocable and Strongly Unforgeable Identity-Based Signature Scheme
    Yang, Xiaodong
    Ma, Tingchun
    Yang, Ping
    An, Faying
    Wang, Caifen
    INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (03): : 575 - 587