Attacks on a Universal Designated Verifier Signature Scheme

被引:1
|
作者
Li Yanping [1 ]
Pang Liaojun [2 ]
Wang Yumin [2 ]
机构
[1] Shaanxi Normal Univ, Coll Math & Informat Sci, Xian 710062, Peoples R China
[2] Xidian Univ, Key Lab Integrated Serv Network, Xian, Peoples R China
关键词
universal designated verifier signature proof (UDVSP); impersonation; bilinear pairing;
D O I
10.1109/IAS.2009.148
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In literature [3], two new universal designated verifier signature proof schemes (UDVSP) based on hardness assumption of the discrete-logarithm problem were proposed at Asiacrypt '05 The UDVSP scheme were proven secure against impersonation attacks in random oracle under Type-1 attack and Type-2 attack Unfortunately, these schemes are totally breakable by any attacker if the attacker is allowed to interact concurrently with many different prover "instances" as well as with the verifier (concurrent reset attacks for short) In this paper, the UDVSP schemes are shown insecure against impersonation under Type-1 attack and are also proven transferable, which contradicts the design goal of universal designated verifier signature scheme
引用
收藏
页码:27 / +
页数:2
相关论文
共 50 条
  • [1] Attacks on One Designated Verifier Proxy Signature Scheme
    Kang, Baoyuan
    [J]. JOURNAL OF APPLIED MATHEMATICS, 2012,
  • [2] Traceable Universal Designated Verifier Signature Proof Scheme
    Tang, Fei
    Ma, Shuai
    Ma, Chun-Liang
    [J]. Ruan Jian Xue Bao/Journal of Software, 2022, 33 (11): : 4305 - 4315
  • [3] A Traceable Universal Designated Verifier Transitive Signature Scheme
    Hou, Shaonan
    Lin, Chengjun
    Yang, Shaojun
    [J]. INFORMATION, 2024, 15 (01)
  • [4] Universal Forgery Attack on a Strong Designated Verifier Signature Scheme
    Hsu, Chien-Lung
    Lin, Han-Yu
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (05) : 425 - 428
  • [5] Restricted universal designated verifier signature
    Huang, Xinyi
    Susilo, Willy
    Mu, Yi
    Zhang, Futai
    [J]. UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2006, 4159 : 874 - 882
  • [6] Universal Designated Multi Verifier Signature Scheme without Random Oracles
    MING Yang1
    2. State Key Laboratory of Integrated Service Network
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 685 - 691
  • [7] An Obfuscatable Designated Verifier Signature Scheme
    Shi, Yang
    Fan, Hongfei
    Liu, Qin
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (02) : 271 - 285
  • [8] Designated verifier proxy signature scheme
    Liao, Yongjian
    Lu, Qing
    Qin, Zhiguang
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 235 - 238
  • [9] On the security of group signature scheme and designated verifier signature scheme
    Zhang, Jianhong
    Geng, Qin
    [J]. PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 351 - 358
  • [10] Universal designated multi verifier signature schemes
    Ng, CY
    Susilo, W
    Mu, Y
    [J]. 11th International Conference on Parallel and Distributed Systems Workshops, Vol II, Proceedings,, 2005, : 305 - 309