Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme

被引:0
|
作者
Dou, Bennian [1 ]
Zhang, Hong [2 ]
Chen, Chun-Hua [3 ]
Xu, Chungen [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Sci, Nanjing 210094, Jiangsu, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Comp Sci, Nanjing 210094, Jiangsu, Peoples R China
[3] Chien Kuo Technol Univ, Dept Comp & Commun, Changhua 500, Taiwan
关键词
verifiably encrypted signature scheme; rogue-key attack; proofs of possession; AGGREGATE;
D O I
10.1587/transfun.E96.A.242
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
At Eurocrypt' 2006, Lu et al. proposed a pairing based verifiably encrypted signature scheme (the LOSSW-VES scheme) without random oracles. In this letter, we show that the LOSSW-VES scheme does not have opacity against rogue-key attacks.
引用
收藏
页码:242 / 243
页数:2
相关论文
共 50 条
  • [1] Message and Key Substitution Attacks on Verifiably Encrypted Signature Schemes
    Dou, Bennian
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1171 - 1172
  • [2] A robust verifiably encrypted signature scheme
    Zhang, Jianhong
    Zou, Wei
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 731 - 740
  • [3] Security of Lu et al.'s proxy-protected signature scheme
    Park, JH
    Kang, BG
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1010 - 1015
  • [4] A Secure Proxy Verifiably Encrypted Signature Scheme
    Zhang, Jianhong
    Gao, Shengnan
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 15 - 19
  • [5] An efficient secure proxy verifiably encrypted signature scheme
    Zhang, Jianhong
    Liu, Chenglian
    Yang, Yixian
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (01) : 29 - 34
  • [6] Verifiably encrypted signature scheme without random oracles
    Gorantla, MC
    Saxena, A
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 357 - 363
  • [7] An efficient ID-Based verifiably encrypted signature scheme based on Hess's scheme
    Kwon, Saeran
    Lee, Sang-Ho
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 93 - 104
  • [8] Identity-Based Proxy Verifiably Encrypted Signature Scheme
    Liu Jianhua
    Liu Jianwei
    Qiu Xiufeng
    [J]. CHINA COMMUNICATIONS, 2012, 9 (11) : 137 - 149
  • [9] A novel verifiably encrypted signature scheme without random oracle
    Zhang, Jianhong
    Mao, Jian
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 65 - +
  • [10] A Secure ID-based Verifiably Encrypted Signature Scheme
    Xin Xiangjun
    Zhang Hongwei
    [J]. PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 471 - +