Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03

被引:2
|
作者
Zhang, FG [1 ]
Safavi-Naini, R
Susilo, W
机构
[1] Sun Yat Sen Univ, Dept Elect & Commun Engn, Sch Informat Sci & Technol, Guangzhou 510275, Peoples R China
[2] Univ Wollongong, Sch Informat Technol & Comp Sci, Wollongong, NSW 2522, Australia
关键词
confirmer signature; undeniable signature; attack; bilinear pairings; ID-based cryptography;
D O I
10.1016/j.amc.2005.01.015
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In ACM conference on electronic commerce (EC'03), Han et al. [Identity-based confirmer signatures from pairings over elliptic curves, in: Proceedings of ACM Conference on Electronic Commerce Citation 2003, San Diego, CA, USA, June 09-12, 2003, pp. 262-263] proposed an ID-based confirmer signature scheme using pairings (the scheme is in fact an ID-based undeniable signature scheme). In this paper, we show that this signature scheme is not secure and the signer can deny any signature, even if it is a valid signature, and any one can forge a valid confirmer signature of a signer with identity I D on an arbitrary message and confirm this signature to the verifier. (c) 2005 Elsevier Inc. All rights reserved.
引用
收藏
页码:1166 / 1169
页数:4
相关论文
共 28 条
  • [1] Attack on Libert et al.'s ID-Based Undeniable Signature Scheme
    Li Zichen
    Yan Yunsheng
    Zhang Juanmei
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (04): : 748 - 750
  • [2] Attack on libert et al.'s ID-based undeniable signature scheme
    Department of Information Security, Beijing Eelctronic Science and Technology Institute, Beijing 100070, China
    不详
    不详
    Chin J Electron, 2008, 4 (748-750):
  • [3] An attack on libert et al.'s ID-based undeniable signature scheme
    Li, Zichen
    Chong, C.F.
    Hui, Lucas Chi-Kwong
    Yiu, Siu-Ming
    Chow, K.P.
    Tsang, Wai-Wan
    Chan, H.W.
    Pun, Kelvin K. H
    International Journal of Network Security, 2007, 5 (02) : 220 - 223
  • [4] Universal Forgery on Shen et al.'s Linkable and Convertible ID-based Ring Signature Scheme
    Hwang, Shin-Jia
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 2201 - 2204
  • [5] On the security of Yuan et al.'s undeniable signature scheme
    Zhao, Wei
    International Journal of Network Security, 2010, 11 (03) : 177 - 180
  • [6] Improvement on Meshram et al.'s ID-based cryptographic mechanism
    Pang, Liaojun
    Li, Huixian
    Pei, Qingqi
    Wang, Yumin
    INFORMATION PROCESSING LETTERS, 2013, 113 (19-21) : 789 - 792
  • [7] Cryptanalysis on improved Chou et al.'s ID-based deniable authentication protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 87 - +
  • [8] Security Issues of Chen et al.'s Dynamic ID-based Authentication Scheme
    Khan, Muhammad Khurram
    Kumari, Saru
    Wang, Xiaomin
    Kumar, Rahul
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 125 - +
  • [9] Weakness in Jung et al.'s ID-based conference key distribution scheme
    Nam, J
    Kim, S
    Won, D
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01) : 213 - 218
  • [10] Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme
    Ma, Chun-Guang
    Wang, Ding
    Zhang, Qi-Ming
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 141 - 152