On the security of an identity-based signature scheme

被引:0
|
作者
机构
[1] Yu, Yong
[2] Li, Ji-Guo
[3] Wu, Wei
[4] Huang, Xin-Yi
来源
Huang, X.-Y. (xyhuang81@gmail.com) | 1600年 / Science Press卷 / 37期
关键词
Authentication - Electronic document identification systems - Cryptography - Security systems;
D O I
10.3724/SP.J.1016.2014.01025
中图分类号
学科分类号
摘要
An identity-based signature is an important cryptographic primitive which can realize the functionality of signing in identity-based cryptography and can also simplify the key management procedures including the generation, management and revocation of digital certificates in the traditional digital signatures. The first identity-based signature that can be proven secure in the standard model was proposed by Paterson and Schuldt, unfortunately, the scheme suffers from low efficiency in computation and heavy cost in communication. An improvement due to Li and Jiang was given, and the scheme was claimed as being provably secure in the standard model, enjoying shorter signature length and less computation operation. However, in this paper, we demonstrate that the new scheme is insecure against the forgery attack by providing a concrete security analysis in their security model. This attack is due to the universal forgery of the key extraction in their scheme. We also show the flaws in their security proof: the view of the adversary is not independent of the event that the simulation succeeds.
引用
收藏
相关论文
共 50 条
  • [1] RKA Security for Identity-Based Signature Scheme
    Chang, Jinyong
    Wang, Huiqun
    Wang, Fei
    Zhang, Anling
    Ji, Yanyan
    IEEE ACCESS, 2020, 8 : 17833 - 17841
  • [2] On the Security of an Identity-Based Aggregate Signature Scheme
    Yap, Wun-She
    Heng, Swee-Huay
    Goi, Bok-Min
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1523 - +
  • [3] A tight security reduction identity-based signature scheme
    Kang, Li
    Lu, Xianhui
    Tang, Xiaohu
    Fan, Jia
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 730 - 734
  • [4] Identity-based quantum signature scheme with strong security
    Xiangjun Xin
    Zhuo Wang
    Qinglan Yang
    Optical and Quantum Electronics, 2019, 51
  • [5] An efficient identity-based signature scheme with provable security
    Yi, Peng
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Wang, Huaqun
    Zhang, Yichen
    Chen, Yu
    INFORMATION SCIENCES, 2021, 576 : 790 - 799
  • [6] RKA Security of Identity-Based Homomorphic Signature Scheme
    Chang, Jinyong
    Ma, Hui
    Zhang, Anling
    Xu, Maozhi
    Xue, Rui
    IEEE ACCESS, 2019, 7 : 50858 - 50868
  • [7] Identity-based quantum signature scheme with strong security
    Xin, Xiangjun
    Wang, Zhuo
    Yang, Qinglan
    OPTICAL AND QUANTUM ELECTRONICS, 2019, 51 (12)
  • [8] Identity-Based Digital Signature Scheme with Forward Security
    Tang Lei
    Liu Yali
    PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 290 - 293
  • [9] On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
    Sun, Ying
    Yu, Yong
    Zhang, Xiaosong
    Chai, Jiwen
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (03) : 721 - 723
  • [10] Security analysis of an identity-based strongly unforgeable signature scheme
    Lee, Kwangsu
    Lee, Dong Hoon
    INFORMATION SCIENCES, 2014, 286 : 29 - 34