RKA Security of Identity-Based Homomorphic Signature Scheme

被引:14
|
作者
Chang, Jinyong [1 ,2 ]
Ma, Hui [3 ]
Zhang, Anling [2 ]
Xu, Maozhi [4 ]
Xue, Rui [3 ]
机构
[1] Xian Univ Architecture & Technol, Sch Informat & Control Engn, Xian 710055, Shaanxi, Peoples R China
[2] Changzhi Univ, Dept Math, Changzhi 046011, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
基金
中国国家自然科学基金;
关键词
Homomorphic signature; IB-signature scheme; RKA security; NETWORK; ATTACKS;
D O I
10.1109/ACCESS.2019.2908244
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Lin et al. proposed a new primitive identity-based (IB) homomorphic signature scheme and presented an ingenious implement by using any IB-signature scheme as a building block. In this paper, we consider a new type of attack on their scheme: Related-key attack (RKA) is introduced by Bellare and Kohno in 2003 and widely considered for kinds of cryptographic primitives. Specifically, for the first time, we define the RKA security of IB-homomorphic signature scheme. By modifying the signing secret key as its linear form, we prove that Lin et al.'s IB-homomorphic signature scheme is not RKA secure. But a slight modification of it yields an RKA secure one under the original assumptions. We also present security proof in detail. However, we remark that the reason why RKA on Lin et al.'s scheme can be successful lies in that RKA is outside of its security model. Finally, the numerical analysis and experimental results demonstrate that our modified scheme does not distinctly decrease the computational efficiency of Lin et al.'s scheme.
引用
收藏
页码:50858 / 50868
页数:11
相关论文
共 50 条
  • [1] RKA Security for Identity-Based Signature Scheme
    Chang, Jinyong
    Wang, Huiqun
    Wang, Fei
    Zhang, Anling
    Ji, Yanyan
    IEEE ACCESS, 2020, 8 : 17833 - 17841
  • [2] On the security of an identity-based signature scheme
    Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):
  • [3] Identity-Based Linearly Homomorphic Signature Scheme from Lattice
    Wang, Shang-Ping
    Di, Wei-Biao
    Deng, Yin-Juan
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 149 - 154
  • [4] An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding
    Zhang, Yudi
    Jiang, Yan
    Li, Bingbing
    Zhang, Mingwu
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 524 - 531
  • [5] On the Security of an Identity-Based Aggregate Signature Scheme
    Yap, Wun-She
    Heng, Swee-Huay
    Goi, Bok-Min
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1523 - +
  • [6] A tight security reduction identity-based signature scheme
    Kang, Li
    Lu, Xianhui
    Tang, Xiaohu
    Fan, Jia
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 730 - 734
  • [7] Identity-based quantum signature scheme with strong security
    Xiangjun Xin
    Zhuo Wang
    Qinglan Yang
    Optical and Quantum Electronics, 2019, 51
  • [8] An efficient identity-based signature scheme with provable security
    Yi, Peng
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Wang, Huaqun
    Zhang, Yichen
    Chen, Yu
    INFORMATION SCIENCES, 2021, 576 : 790 - 799
  • [9] Identity-based quantum signature scheme with strong security
    Xin, Xiangjun
    Wang, Zhuo
    Yang, Qinglan
    OPTICAL AND QUANTUM ELECTRONICS, 2019, 51 (12)
  • [10] Identity-Based Digital Signature Scheme with Forward Security
    Tang Lei
    Liu Yali
    PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 290 - 293