Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03

被引:2
|
作者
Zhang, FG [1 ]
Safavi-Naini, R
Susilo, W
机构
[1] Sun Yat Sen Univ, Dept Elect & Commun Engn, Sch Informat Sci & Technol, Guangzhou 510275, Peoples R China
[2] Univ Wollongong, Sch Informat Technol & Comp Sci, Wollongong, NSW 2522, Australia
关键词
confirmer signature; undeniable signature; attack; bilinear pairings; ID-based cryptography;
D O I
10.1016/j.amc.2005.01.015
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In ACM conference on electronic commerce (EC'03), Han et al. [Identity-based confirmer signatures from pairings over elliptic curves, in: Proceedings of ACM Conference on Electronic Commerce Citation 2003, San Diego, CA, USA, June 09-12, 2003, pp. 262-263] proposed an ID-based confirmer signature scheme using pairings (the scheme is in fact an ID-based undeniable signature scheme). In this paper, we show that this signature scheme is not secure and the signer can deny any signature, even if it is a valid signature, and any one can forge a valid confirmer signature of a signer with identity I D on an arbitrary message and confirm this signature to the verifier. (c) 2005 Elsevier Inc. All rights reserved.
引用
收藏
页码:1166 / 1169
页数:4
相关论文
共 28 条
  • [21] Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes
    Wu, LC
    Yeh, YS
    Liu, TS
    JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (02) : 176 - 179
  • [22] Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme
    Park, Chanhyeok
    Cho, Sangrae
    Cho, Young-Seob
    Kim, Soohyung
    Lee, Hyung Tae
    IEEE ACCESS, 2024, 12 : 16462 - 16473
  • [23] Improvement on Hwang et al.'s generalization of proxy signature schemes based on elliptic curves
    Hwang, SJ
    Huang, CW
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 941 - 947
  • [24] Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce
    Yoon, Eun-Jun
    Yoo, Kee-Young
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF CONTEMPORARY INTELLIGENT COMPUTING TECHNIQUES, 2008, 15 : 533 - +
  • [26] Comment on Lee J-s et al.'s identity-based designated verifer proxy signature scheme and its improvement
    Liao Da-jian
    Tang Yuan-sheng
    SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 753 - +
  • [27] Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof
    Lee, Ji-Seon
    Chang, Jik Hyun
    Lee, Dong Hoon
    COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (05) : 948 - 954
  • [28] Provably secure color image encryption algorithm based on FO 4D-HCS and ACM: Provably secure color image encryption..: S. Ullah et al.
    Ullah, Saeed
    Liu, Xinge
    Waheed, Adil
    Zhang, Shuailei
    Soft Computing, 2024, 28 (21) : 12879 - 12896