Comment on Lee et al.’s group signature and e-auction scheme

被引:0
|
作者
Yanbin Sun
Yan Sun
Mingxing Luo
Lize Gu
Shihui Zheng
Yixian Yang
机构
[1] Beijing University of Posts and Telecommunications,Information Security Center, State Key Laboratory of Networking and Switching Technology
[2] Shijiazhuang Army Command Academy,Operation Research Center
[3] Southwest Jiaotong University,Information Security Center, School of Information Science and Technology
来源
关键词
Electronic auction; Group signature; Sealed-bib auction; Insecure;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, Lee et al. used their new group signature with the function of authenticated encryption to design a sealed-bid auction scheme, and they claimed that their schemes are secure. In this paper, we show that if the group manager has a valid group signature of a member, without the member’s secret key, he can forge a group signature on arbitrary message on behalf of the member; then, if the registration manager (RM) and the auction manager (AM) conspired (with each other) in their auction scheme, they can forge a new bid on any goods on behalf of the bidder who has sent his/her bid to AM. Therefore, their group signature and auction scheme are insecure. Finally, we improve Lee et al.’s group signature scheme to overcome the modification attack and achieve the security requirements.
引用
收藏
页码:133 / 139
页数:6
相关论文
共 50 条
  • [21] Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme
    Dou, Bennian
    Zhang, Hong
    Chen, Chun-Hua
    Xu, Chungen
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 242 - 243
  • [22] Improvement on Huang et al.'s Novel Efficient Threshold Proxy Signature Scheme
    Hu, Jiang-hong
    Huang, Mei-juan
    Zhang, Jian-zhong
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 116 - 119
  • [23] An attack on libert et al.'s ID-based undeniable signature scheme
    Li, Zichen
    Chong, C.F.
    Hui, Lucas Chi-Kwong
    Yiu, Siu-Ming
    Chow, K.P.
    Tsang, Wai-Wan
    Chan, H.W.
    Pun, Kelvin K. H
    [J]. International Journal of Network Security, 2007, 5 (02) : 220 - 223
  • [24] Improved Chen et al.'s Concurrent Signature Scheme Providing Anonymity and Identification
    Hwang Shinjia
    Hsu Teysu
    [J]. PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 639 - 641
  • [25] Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme
    Park, Chanhyeok
    Cho, Sangrae
    Cho, Young-Seob
    Kim, Soohyung
    Lee, Hyung Tae
    [J]. IEEE ACCESS, 2024, 12 : 16462 - 16473
  • [26] A universal forgery on Araki et al.'s convertible limited verifier signature scheme
    Zhang, FG
    Kim, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (02): : 515 - 516
  • [27] Attack on Libert et al.'s ID-Based Undeniable Signature Scheme
    Li Zichen
    Yan Yunsheng
    Zhang Juanmei
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (04) : 748 - 750
  • [28] Comment to E-Video by Gupta et al.
    De Siena, Martina
    Boskoski, Ivo
    Matteo, Maria Valeria
    [J]. ENDOSCOPY, 2023, 55 (04) : 397 - 397
  • [29] To Holroyd E (2005) commentary on Lee et al. (2004) - Response
    Lee, I
    Lee, EO
    Kim, HS
    Park, YS
    Song, M
    Park, YH
    [J]. JOURNAL OF CLINICAL NURSING, 2006, 15 (05) : 654 - 656
  • [30] Comment on " An ionospheric convection signature of antiparallel reconnection'' by Coleman et al.
    Petrinec, SM
    Fuselier, SA
    [J]. JOURNAL OF GEOPHYSICAL RESEARCH-SPACE PHYSICS, 2003, 108 (A5)