Comment on Lee et al.'s group signature and e-auction scheme

被引:3
|
作者
Sun, Yanbin [1 ]
Sun, Yan
Luo, Mingxing [2 ]
Gu, Lize [1 ]
Zheng, Shihui [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100088, Peoples R China
[2] Southwest Jiaotong Univ, Informat Secur Ctr, Sch Informat Sci & Technol, Chengdu, Peoples R China
基金
中国国家自然科学基金;
关键词
Electronic auction; Group signature; Sealed-bib auction; Insecure; ENGLISH AUCTION; SECURE;
D O I
10.1007/s10796-011-9312-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Lee et al. used their new group signature with the function of authenticated encryption to design a sealed-bid auction scheme, and they claimed that their schemes are secure. In this paper, we show that if the group manager has a valid group signature of a member, without the member's secret key, he can forge a group signature on arbitrary message on behalf of the member; then, if the registration manager (RM) and the auction manager (AM) conspired (with each other) in their auction scheme, they can forge a new bid on any goods on behalf of the bidder who has sent his/her bid to AM. Therefore, their group signature and auction scheme are insecure. Finally, we improve Lee et al.'s group signature scheme to overcome the modification attack and achieve the security requirements.
引用
收藏
页码:133 / 139
页数:7
相关论文
共 50 条
  • [1] Comment on Lee et al.’s group signature and e-auction scheme
    Yanbin Sun
    Yan Sun
    Mingxing Luo
    Lize Gu
    Shihui Zheng
    Yixian Yang
    [J]. Information Systems Frontiers, 2013, 15 : 133 - 139
  • [2] A secure e-auction scheme based on group signatures
    Lee, Cheng-Chi
    Ho, Pi-Fang
    Hwang, Min-Shiang
    [J]. INFORMATION SYSTEMS FRONTIERS, 2009, 11 (03) : 335 - 343
  • [3] A secure e-auction scheme based on group signatures
    Cheng-Chi Lee
    Pi-Fang Ho
    Min-Shiang Hwang
    [J]. Information Systems Frontiers, 2009, 11 : 335 - 343
  • [4] Comment on Lee et al.
    Yung, Alison R.
    Lin, Ashleigh
    Cotter, Jack
    Wood, Stephen
    [J]. SCHIZOPHRENIA RESEARCH, 2014, 159 (01) : 253 - 253
  • [5] On the security of Miyaji et al. group signature scheme
    Zhang, JH
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 1373 - 1382
  • [6] Comment on Saeednia et al.'s strong designated verifier signature scheme
    Lee, Ji-Seon
    Chang, Jik Hyun
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 258 - 260
  • [7] Comment on Lee J-s et al.'s identity-based designated verifer proxy signature scheme and its improvement
    Liao Da-jian
    Tang Yuan-sheng
    [J]. SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 753 - +
  • [8] Cryptanalysis and improvement on Chang et al.'s signature scheme
    Wang, Qing-Long
    Han, Zhen
    Geng, Xiu-Hua
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 112 - 114
  • [9] Cryptanalysis of Lee et al.'s authenticated group key agreement
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    [J]. CEIS 2011, 2011, 15
  • [10] Cryptanalysis of Chang et al.'s signature scheme with message recovery
    Zhang, FG
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (04) : 358 - 359