Comment on "An efficient identity-based signature scheme with provable security"

被引:0
|
作者
Tan, Syh-Yuan [1 ]
Heng, Swee-Huay [1 ]
机构
[1] Multimedia Univ, Fac Informat Sci & Technol, Melaka, Malaysia
关键词
Cryptanalysis; Identity-based signature; Provable security; Standard model; IDENTIFICATION;
D O I
10.1016/j.ins.2023.120079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this comment paper, we reveal a security issue in an efficient identity-based signature (IBS) scheme that has been proven secure in the standard model. More specifically, we perform a keyonly attack on the IBS scheme to break its universal unforgeability. Since the security notion of universal unforgeability under key-only attack (uuf-koa) is a weaker notion than the existential unforgeability under chosen message attack (euf-cma), this invalidates the euf-cma security claimed by the IBS scheme. Subsequently, we propose a fix to achieve a stronger seuf-cma security without a random oracle.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] An efficient identity-based signature scheme with provable security
    Yi, Peng
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Wang, Huaqun
    Zhang, Yichen
    Chen, Yu
    INFORMATION SCIENCES, 2021, 576 : 790 - 799
  • [2] An efficient provable security identity-based proxy aggregate signature scheme
    Guo, Lei
    Hu, Defa
    International Journal of Applied Mathematics and Statistics, 2013, 51 (23): : 212 - 222
  • [3] An Identity-Based Blind Signature Scheme Using Lattice with Provable Security
    Li, Quanrun
    Hsu, Chingfang
    He, Debiao
    Choo, Kim-Kwang Raymond
    Gong, Peng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [4] On the security of an identity-based signature scheme
    Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):
  • [5] An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme
    Chin, Ji-Jian
    Behnia, Rouzbeh
    Heng, Swee-Huay
    Phan, Raphael C. -W.
    2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 27 - 32
  • [6] RKA Security for Identity-Based Signature Scheme
    Chang, Jinyong
    Wang, Huiqun
    Wang, Fei
    Zhang, Anling
    Ji, Yanyan
    IEEE ACCESS, 2020, 8 : 17833 - 17841
  • [7] On the Security of an Identity-Based Aggregate Signature Scheme
    Yap, Wun-She
    Heng, Swee-Huay
    Goi, Bok-Min
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1523 - +
  • [8] Provable secure identity-based multi-proxy signature scheme
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (03) : 497 - 512
  • [9] Analysis and improvement of a provable secure fuzzy identity-based signature scheme
    Xiong Hu
    Chen YaNan
    Zhu GuoBin
    Qin ZhiGuang
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (09) : 1 - 5
  • [10] Analysis and improvement of a provable secure fuzzy identity-based signature scheme
    Hu Xiong
    YaNan Chen
    GuoBin Zhu
    ZhiGuang Qin
    Science China Information Sciences, 2014, 57 : 1 - 5