Comment on "An efficient identity-based signature scheme with provable security"

被引:0
作者
Tan, Syh-Yuan [1 ]
Heng, Swee-Huay [1 ]
机构
[1] Multimedia Univ, Fac Informat Sci & Technol, Melaka, Malaysia
关键词
Cryptanalysis; Identity-based signature; Provable security; Standard model; IDENTIFICATION;
D O I
10.1016/j.ins.2023.120079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this comment paper, we reveal a security issue in an efficient identity-based signature (IBS) scheme that has been proven secure in the standard model. More specifically, we perform a keyonly attack on the IBS scheme to break its universal unforgeability. Since the security notion of universal unforgeability under key-only attack (uuf-koa) is a weaker notion than the existential unforgeability under chosen message attack (euf-cma), this invalidates the euf-cma security claimed by the IBS scheme. Subsequently, we propose a fix to achieve a stronger seuf-cma security without a random oracle.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage
    Zhao, Jining
    Xu, Chunxiang
    Chen, Kefei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (09): : 4576 - 4598
  • [42] Analysis and improvement of an identity-based signature scheme from lattices
    Yang, Chun-Li
    Yan, Jian-Hua
    Zheng, Shi-Hui
    Wang, Li-Cheng
    Yang, Yu
    Tongxin Xuebao/Journal on Communications, 2015, 36 (05):
  • [43] A short and highly efficient identity-based designated verifier proxy signature scheme
    Hu, Xiaoming
    Wang, Jian
    Xu, Huajie
    Tan, Wenan
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 907 - 916
  • [44] An Efficient Identity-Based Proxy Signature Scheme in the Standard Model with Tight Reduction
    Hu, Xiaoming
    Lu, Hong
    Xu, Huajie
    Wang, Jian
    Yang, Yinchun
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 309 - 319
  • [45] Novel efficient identity-based signature on lattices
    Chen, Jiang-shan
    Hu, Yu-pu
    Liang, Hong-mei
    Gao, Wen
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2021, 22 (02) : 244 - 250
  • [46] Efficient Identity-Based Signature from Lattices
    Tian, Miaomiao
    Huang, Liusheng
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 321 - 329
  • [47] An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things
    Qiao, Zirui
    Yang, Qiliang
    Zhou, Yanwei
    Yang, Bo
    Xia, Zhe
    Zhang, Mingwu
    Wang, Tao
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 72 - 82
  • [48] Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme
    Behnia, Rouzbeh
    Tan, Syh-Yuan
    Heng, Swee-Huay
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 474 - 477
  • [49] Forward Secure Identity-Based Signature Scheme with RSA
    Ko, Hankyung
    Jeong, Gweonho
    Kim, Jongho
    Kim, Jihye
    Oh, Hyunok
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 314 - 327
  • [50] Identity-Based Sanitizable Signature Scheme in the Standard Model
    Ming, Yang
    Shen, Xiaoqin
    Peng, Yamian
    INFORMATION COMPUTING AND APPLICATIONS, PT 1, 2010, 105 : 9 - +