Cryptanalysis of "an identity-based society oriented signature scheme with anonymous signers"

被引:3
|
作者
Shao, ZH [1 ]
机构
[1] Zhejiang Univ Sci & Technol, Dept Elect & Comp Engn, Hangzhou 310012, Zhejiang, Peoples R China
关键词
cryptography; digital signature; identity-based;
D O I
10.1016/S0020-0190(03)00224-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we show that the identity-based society oriented signature scheme with anonymous signers proposed by Saeednia is insecure. If some members of a given group leave that group or if some new members join the group, their secret keys would be revealed. We also propose a simple way to fulfill the task of the identity-based society oriented signature scheme with anonymous signers. (C) 2003 Published by Elsevier Science B.V.
引用
收藏
页码:295 / 298
页数:4
相关论文
共 50 条
  • [1] An identity-based society oriented signature scheme with anonymous signers
    Saeednia, S
    [J]. INFORMATION PROCESSING LETTERS, 2002, 83 (06) : 295 - 299
  • [2] An Improved Identity-Based Society Oriented Signature Scheme with Anonymous Signers
    TANG Chunming School of Mathematics and Information Sciences/ Guangdong Province Key Laboratory
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 121 - 125
  • [3] An Improved Identity-based Society Oriented Signature Scheme
    Tan, Zuowen
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 338 - 341
  • [4] Identity-based threshold proxy signature scheme with known signers
    Bao, Haiyong
    Cao, Zhenfu
    Wang, Shengbao
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2006, 3959 : 538 - 546
  • [5] Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme
    Behnia, Rouzbeh
    Tan, Syh-Yuan
    Heng, Swee-Huay
    [J]. PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 474 - 477
  • [6] Cryptanalysis of a secure and efficient identity-based signature scheme
    Yu, Yong
    Ni, Jian-Bing
    Xu, Chun-Xiang
    Niu, Lei
    [J]. Ruan Jian Xue Bao/Journal of Software, 2014, 25 (05): : 1125 - 1131
  • [8] On the security of an identity-based threshold proxy signature scheme with known signers
    Lu, Rongbo
    He, Dake
    Wang, Changji
    [J]. ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 3, PROCEEDINGS, 2007, : 210 - +
  • [9] Identity-Based Partially Blind Signature Scheme: Cryptanalysis and Construction
    Jiang, Yuhong
    Deng, Lunzhi
    Ning, Bingqin
    [J]. IEEE ACCESS, 2021, 9 : 78017 - 78024
  • [10] An identity-based multiple grade anonymous proxy signature scheme
    Cui, Shenjun
    Wen, Fengtong
    [J]. Journal of Computational Information Systems, 2010, 6 (07): : 2441 - 2447