Universal Forgery on Shen et al.'s Linkable and Convertible ID-based Ring Signature Scheme

被引:0
|
作者
Hwang, Shin-Jia [1 ]
机构
[1] Tamkang Univ, Dept Comp Sci & Informat Engn, New Taipei 251, Taiwan
关键词
ID-based ring signature; convertible ring signatures; universal forgery;
D O I
10.3233/978-1-61499-484-8-2201
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Shen et al. proposes their ID-based ring signature scheme. Based on the scheme, they also propose their linkable and convertible ID-based ring signature scheme. However, a universal forgery is found for their ID-based ring signature scheme. Therefore, their linkable and convertible ID-based ring signature scheme is also insecure against universal forgeries.
引用
收藏
页码:2201 / 2204
页数:4
相关论文
共 50 条
  • [1] A universal forgery on Araki et al.'s convertible limited verifier signature scheme
    Zhang, FG
    Kim, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (02): : 515 - 516
  • [2] Attack on Libert et al.'s ID-Based Undeniable Signature Scheme
    Li Zichen
    Yan Yunsheng
    Zhang Juanmei
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (04) : 748 - 750
  • [3] A novel ID-based threshold ring signature scheme competent for anonymity and anti-forgery
    Wu, Zhen Yu
    Jeng, Fuh Gwo
    Chen, Tzer Shyong
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1351 - 1354
  • [4] A novel ID-based threshold ring signature scheme competent for anonymity and anti-forgery
    Chung, Yu Fang
    Wu, Zhen Yu
    Lai, Feipei
    Chen, Tzer Shyong
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 502 - +
  • [5] Security Issues of Chen et al.'s Dynamic ID-based Authentication Scheme
    Khan, Muhammad Khurram
    Kumari, Saru
    Wang, Xiaomin
    Kumar, Rahul
    [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 125 - +
  • [6] New Forgery Attack on Chang et al.'s signature scheme
    Li, Kou
    Ming, Jin
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 5 - 6
  • [7] Weakness in Jung et al.'s ID-based conference key distribution scheme
    Nam, J
    Kim, S
    Won, D
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01) : 213 - 218
  • [8] Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme
    Ma, Chun-Guang
    Wang, Ding
    Zhang, Qi-Ming
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 141 - 152
  • [9] Efficient ID-based Threshold Ring Signature scheme
    Jiang Han
    Xu QiuLiang
    Chen Guohua
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 437 - 442
  • [10] An Efficient ID-based Proxy Ring Signature Scheme
    Wu Lei
    Li Daxing
    [J]. 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +