Cryptanalysis of two strongly unforgeable identity-based signatures in the standard model

被引:1
|
作者
Yang, Wenjie [1 ,2 ]
Chen, Min-Rong [2 ]
Zeng, Guo-Qiang [3 ]
机构
[1] College of Cyber Security, College of Information Science and Technology, Jinan University, China
[2] School of Computer, South China Normal University, Guangzhou,510631, China
[3] National-Local Joint Engineering Laboratory of Digitalize Electrical Design Technology, Wenzhou University, China
来源
基金
中国国家自然科学基金;
关键词
Cryptography - Electronic document identification systems - Network security;
D O I
10.6633/IJNS.201811.20(6).19
中图分类号
学科分类号
摘要
The strong unforgeability of digital signature means that no attacker can forge a valid signature on a message, even given some previous signatures on the message, which has been widely accepted as a common security requirement. Recently, Tsai et al. and Hung et al. presented an efficient identity-based signature scheme and a revocable identity- based signature scheme, respectively. Meanwhile, they all claimed that their scheme is strongly unforgeable against chosen message attacks. In this paper, we point out that the two schemes cannot meet the requirements of strong unforgeability by giving some concrete attacks and brie y analyze the reasons why the provably-secure schemes are insecure following their security model. © 2018 International Journal of Network Security.
引用
收藏
页码:1194 / 1199
相关论文
共 50 条
  • [31] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856
  • [32] Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model
    Liu, Joseph K.
    Au, Man Ho
    Susilo, Willy
    Zhou, Jianying
    COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 168 - +
  • [33] Generic constructions for universal designated-verifier signatures and identity-based signatures from standard signatures
    Shahandashti, S. F.
    Safavi-Naini, R.
    IET INFORMATION SECURITY, 2009, 3 (04) : 152 - 176
  • [34] Secure Outsourcing of Two Standard Identity-Based Cryptosystems
    Saeidi, Mohammad Reza
    Mala, Hamid
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (02): : 216 - 229
  • [35] Lattice-based strongly-unforgeable forward-secure identity-based signature scheme with flexible key update
    Zhang, Xiangsong
    Liu, Zhenhua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (05): : 2792 - 2810
  • [36] Identity-based optimistic fair exchange in the standard model
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 1010 - 1020
  • [37] Efficient Identity-Based Proxy Signature in the Standard Model
    Gu, Ke
    Jia, Weijia
    Jiang, Chunlin
    COMPUTER JOURNAL, 2015, 58 (04): : 792 - 807
  • [38] Fuzzy Biometric identity-based signature in the standard model
    Zhang Leyou
    Wu Qing
    Hu Yupu
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE, PTS 1-4, 2011, 44-47 : 3350 - +
  • [39] Identity-based Threshold Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (03): : 400 - 410
  • [40] Analysis of an Identity-Based Signcryption Scheme in the Standard Model
    Li, Fagen
    Liao, Yongjian
    Qin, Zhiguang
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 268 - 269