On the security of two identity-based signature schemes based on pairings

被引:16
|
作者
Qin, Zhen [1 ]
Yuan, Chen [1 ]
Wang, Yilei [1 ]
Xiong, Hu [1 ,2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
Cryptography; Identity-based signature; Bilinear pairings; Forgery attack; Key disclosure attack;
D O I
10.1016/j.ipl.2016.02.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ID-based signature enables users to verify signatures using only public identifier. Very recently, Rossi and Schmid (2015) [9] proposed two identity-based signature schemes along with the application to group communications. Unfortunately, by proposing concrete attack, we demonstrate that the former scheme is insecure against forgery attack, while the latter scheme has been totally broken in the sense that the signing key can be recovered from the valid signature easily. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:416 / 418
页数:3
相关论文
共 50 条
  • [11] Identity-based Threshold Ring Signature Without Pairings
    Xiong Hu
    Qin ZhiGuang
    Li Fagen
    Jin Jing
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 537 - 541
  • [12] Two new identity-based threshold ring signature schemes
    Deng, Lunzhi
    Zeng, Jiwen
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 535 : 38 - 45
  • [13] An identity-based threshold ring signature scheme based on the bilinear pairings
    Shang, Jiu-qing
    Xu, Qiu-liang
    Liu, Xin
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 233 - +
  • [14] On the security of an identity-based signature scheme
    [J]. Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):
  • [15] An identity-based ring signature scheme from bilinear pairings
    Lin, CY
    Wu, TC
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 182 - 185
  • [16] New identity-based ring signature schemes
    Herranz, J
    Sáez, G
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 27 - 39
  • [17] Identity-Based Threshold Proxy Signature from Bilinear Pairings
    Liu, Jenshiuh
    Huang, Shaonong
    [J]. INFORMATICA, 2010, 21 (01) : 41 - 56
  • [18] Identity-Based Directed Signature Scheme without Bilinear Pairings
    Rao, R. R. V. Krishna
    Gayathri, N. B.
    Reddy, P. Vasudeva
    [J]. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (02): : 335 - 353
  • [19] Feasibility analysis of two identity-based proxy ring signature schemes
    Wang, Huaqun
    Zhang, Lijun
    Zhao, Junxi
    [J]. High Technology Letters, 2007, 13 (02) : 207 - 209
  • [20] Analysis and improvements of two identity-based perfect concurrent signature schemes
    Huang, Zhenjie
    Chen, Kefei
    Lin, Xuanzhi
    Huang, Rufen
    [J]. INFORMATICA, 2007, 18 (03) : 375 - +