On the security of two identity-based signature schemes based on pairings

被引:16
|
作者
Qin, Zhen [1 ]
Yuan, Chen [1 ]
Wang, Yilei [1 ]
Xiong, Hu [1 ,2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
Cryptography; Identity-based signature; Bilinear pairings; Forgery attack; Key disclosure attack;
D O I
10.1016/j.ipl.2016.02.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ID-based signature enables users to verify signatures using only public identifier. Very recently, Rossi and Schmid (2015) [9] proposed two identity-based signature schemes along with the application to group communications. Unfortunately, by proposing concrete attack, we demonstrate that the former scheme is insecure against forgery attack, while the latter scheme has been totally broken in the sense that the signing key can be recovered from the valid signature easily. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:416 / 418
页数:3
相关论文
共 50 条
  • [1] Two Identity-Based Aggregate Signature Schemes from Pairings
    Sahana, Subhas Chandra
    Das, Sourav Kumar
    Mashahary, Sangeeta
    Bhuyan, Bubu
    [J]. ADVANCES IN COMMUNICATION, DEVICES AND NETWORKING, 2018, 462 : 877 - 884
  • [2] Security Proofs for Identity-Based Identification and Signature Schemes
    Bellare, Mihir
    Namprempre, Chanathip
    Neven, Gregory
    [J]. JOURNAL OF CRYPTOLOGY, 2009, 22 (01) : 1 - 61
  • [3] Security Proofs for Identity-Based Identification and Signature Schemes
    Mihir Bellare
    Chanathip Namprempre
    Gregory Neven
    [J]. Journal of Cryptology, 2009, 22 : 1 - 61
  • [4] Security proofs for identity-based identification and signature schemes
    Bellare, M
    Namprempre, C
    Neven, G
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 268 - 286
  • [5] Identity-based proxy signature from pairings
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Seberry, Jennifer
    Huang, Xinyi
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 22 - +
  • [6] Security analysis of batch verification on identity-based signature schemes
    Chiang, Han-Fei
    Yen, Sung-Ming
    Lin, Hsi-Chung
    [J]. PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4, 2007, : 50 - +
  • [7] Efficient identity based signature schemes based on pairings
    Hess, F
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 310 - 324
  • [8] New identity-based society oriented signature schemes from pairings on elliptic curves
    Lin, CY
    Wu, TC
    Zhang, FG
    Hwang, JJ
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 160 (01) : 245 - 260
  • [9] An identity-based proxy signature scheme from pairings
    Shim, Kyung-Ah
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71
  • [10] An Identity-Based Proxy Signature from Bilinear Pairings
    Ji, Huifang
    Han, Wenbao
    Zhao, Long
    Wang, Yongjuan
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 14 - 17