Comment on Lee et al.’s group signature and e-auction scheme

被引:0
|
作者
Yanbin Sun
Yan Sun
Mingxing Luo
Lize Gu
Shihui Zheng
Yixian Yang
机构
[1] Beijing University of Posts and Telecommunications,Information Security Center, State Key Laboratory of Networking and Switching Technology
[2] Shijiazhuang Army Command Academy,Operation Research Center
[3] Southwest Jiaotong University,Information Security Center, School of Information Science and Technology
来源
关键词
Electronic auction; Group signature; Sealed-bib auction; Insecure;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, Lee et al. used their new group signature with the function of authenticated encryption to design a sealed-bid auction scheme, and they claimed that their schemes are secure. In this paper, we show that if the group manager has a valid group signature of a member, without the member’s secret key, he can forge a group signature on arbitrary message on behalf of the member; then, if the registration manager (RM) and the auction manager (AM) conspired (with each other) in their auction scheme, they can forge a new bid on any goods on behalf of the bidder who has sent his/her bid to AM. Therefore, their group signature and auction scheme are insecure. Finally, we improve Lee et al.’s group signature scheme to overcome the modification attack and achieve the security requirements.
引用
收藏
页码:133 / 139
页数:6
相关论文
共 50 条
  • [1] Comment on Lee et al.'s group signature and e-auction scheme
    Sun, Yanbin
    Sun, Yan
    Luo, Mingxing
    Gu, Lize
    Zheng, Shihui
    Yang, Yixian
    [J]. INFORMATION SYSTEMS FRONTIERS, 2013, 15 (01) : 133 - 139
  • [2] A secure e-auction scheme based on group signatures
    Lee, Cheng-Chi
    Ho, Pi-Fang
    Hwang, Min-Shiang
    [J]. INFORMATION SYSTEMS FRONTIERS, 2009, 11 (03) : 335 - 343
  • [3] A secure e-auction scheme based on group signatures
    Cheng-Chi Lee
    Pi-Fang Ho
    Min-Shiang Hwang
    [J]. Information Systems Frontiers, 2009, 11 : 335 - 343
  • [4] Comment on Lee et al.
    Yung, Alison R.
    Lin, Ashleigh
    Cotter, Jack
    Wood, Stephen
    [J]. SCHIZOPHRENIA RESEARCH, 2014, 159 (01) : 253 - 253
  • [5] On the security of Miyaji et al. group signature scheme
    Zhang, JH
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 1373 - 1382
  • [6] Comment on Saeednia et al.'s strong designated verifier signature scheme
    Lee, Ji-Seon
    Chang, Jik Hyun
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 258 - 260
  • [7] Comment on Lee J-s et al.'s identity-based designated verifer proxy signature scheme and its improvement
    Liao Da-jian
    Tang Yuan-sheng
    [J]. SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 753 - +
  • [8] Cryptanalysis and improvement on Chang et al.'s signature scheme
    Wang, Qing-Long
    Han, Zhen
    Geng, Xiu-Hua
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 112 - 114
  • [9] Cryptanalysis of Lee et al.'s authenticated group key agreement
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    [J]. CEIS 2011, 2011, 15
  • [10] Cryptanalysis of Chang et al.'s signature scheme with message recovery
    Zhang, FG
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (04) : 358 - 359