Analysis and improvement of a provable secure fuzzy identity-based signature scheme

被引:3
作者
Xiong Hu [1 ,2 ,3 ,5 ]
Chen YaNan [4 ]
Zhu GuoBin [1 ]
Qin ZhiGuang [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 610054, Peoples R China
[2] Chongqing Key Lab Comp Network & Commun Technol, Chongqing 400065, Peoples R China
[3] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Fuzhou 350007, Peoples R China
[4] Beijing Jiaotong Univ, Sch Traff & Transportat, Beijing 100871, Peoples R China
[5] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
identity-based cryptosystem; fuzzy identity-based signature; forgery attack; cryptanalysis; bilinear pairings;
D O I
10.1007/s11432-014-5152-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To enjoy the property of error tolerance in the biometric identities extraction, the fuzzy identity-based signature has been initialized to issue a signature on behalf of a descriptive attributes set co instead of a single string. Any attributes set omega' can be used to verify the validity of the signature in case the distance between omega and omega' is less than a pre-defined threshold. Recently, Wang re-formalized the notion of fuzzy identity-based signature and proposed a concrete pairing-based construction along with the efficiency analysis and formal security proof. Unfortunately, by giving concrete attack, we indicate that Wang's scheme is not secure against forgery attack. We also present an improved scheme to prevent this attack.
引用
收藏
页码:1 / 5
页数:5
相关论文
共 14 条
[1]  
Baek J, 2004, LECT NOTES COMPUT SC, V2947, P262
[2]  
Baek J, 2004, ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, P124
[3]   Identity-based signature scheme based on quadratic residues [J].
Chai ZhenChuan ;
Cao ZhenFu ;
Dong XiaoLei .
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03) :373-380
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]   Efficient identity based signature schemes based on pairings [J].
Hess, F .
SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 :310-324
[6]   Fuzzy identity-based encryption [J].
Sahai, A ;
Waters, B .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :457-473
[7]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[8]  
Shamir A., 1985, WORKSHOP THEORY APPL, V196, P47, DOI [10.1007/3-540-39568-7_5, 10.1007/3-540-39568-75]
[9]   Batch proxy quantum blind signature scheme [J].
Shi JinJing ;
Shi RongHua ;
Guo Ying ;
Peng XiaoQi ;
Tang Ying .
SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) :1-9
[10]   Selectively unforgeable but existentially forgeable signature schemes and applications [J].
Tian HaiBo ;
Zhang FangGuo ;
Chen XiaoFeng ;
Wei BaoDian .
SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (01) :1-14