Cryptanalysis of two strongly unforgeable identity-based signatures in the standard model

被引:1
|
作者
Yang, Wenjie [1 ,2 ]
Chen, Min-Rong [2 ]
Zeng, Guo-Qiang [3 ]
机构
[1] College of Cyber Security, College of Information Science and Technology, Jinan University, China
[2] School of Computer, South China Normal University, Guangzhou,510631, China
[3] National-Local Joint Engineering Laboratory of Digitalize Electrical Design Technology, Wenzhou University, China
来源
基金
中国国家自然科学基金;
关键词
Cryptography - Electronic document identification systems - Network security;
D O I
10.6633/IJNS.201811.20(6).19
中图分类号
学科分类号
摘要
The strong unforgeability of digital signature means that no attacker can forge a valid signature on a message, even given some previous signatures on the message, which has been widely accepted as a common security requirement. Recently, Tsai et al. and Hung et al. presented an efficient identity-based signature scheme and a revocable identity- based signature scheme, respectively. Meanwhile, they all claimed that their scheme is strongly unforgeable against chosen message attacks. In this paper, we point out that the two schemes cannot meet the requirements of strong unforgeability by giving some concrete attacks and brie y analyze the reasons why the provably-secure schemes are insecure following their security model. © 2018 International Journal of Network Security.
引用
收藏
页码:1194 / 1199
相关论文
共 50 条
  • [21] Secure identity-based signcryption in the standard model
    Li, Fagen
    Takagi, Tsuyoshi
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (11-12) : 2685 - 2694
  • [23] Strongly unforgeable signatures based on computational Diffie-Hellman
    Boneh, Dan
    Shen, Emily
    Waters, Brent
    PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 229 - 240
  • [24] Hidden identity-based signatures
    Kiayias, A.
    Zhou, H. -S.
    IET INFORMATION SECURITY, 2009, 3 (03) : 119 - 127
  • [25] Identity-based aggregate signatures
    Gentry, Craig
    Ramzan, Zulfikar
    PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 257 - 273
  • [26] Cryptanalysis of an identity based signcryption scheme in the standard model
    Ming, Yang
    Wang, Yumin
    International Journal of Network Security, 2016, 18 (01) : 165 - 171
  • [27] Hidden identity-based signatures
    Kiayias, Aggelos
    Zhou, Hong-Sheng
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2007, 4886 : 134 - 147
  • [28] Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction
    Yu, Jia
    Hao, Rong
    Xia, Hui
    Zhang, Hanlin
    Cheng, Xiangguo
    Kong, Fanyu
    INFORMATION SCIENCES, 2018, 442 : 158 - 172
  • [29] Efficient identity-based signatures and blind signatures
    Huang, ZJ
    Chen, KF
    Wang, YM
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 120 - 133
  • [30] Strongly unforgeable proxy signature scheme secure in the standard model
    Sun, Ying
    Xu, Chunxiang
    Yu, Yong
    Mu, Yi
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (09) : 1471 - 1479