• DocumentCode
    510200
  • Title

    Analysis of Two Signature Schemes from CIS´2006

  • Author

    Liu, Lihua ; Cao, Zhengjun

  • Author_Institution
    Dept. of Math., Shanghai Maritime Univ., Shanghai, China
  • Volume
    1
  • fYear
    2009
  • fDate
    11-14 Dec. 2009
  • Firstpage
    405
  • Lastpage
    408
  • Abstract
    In CIS´2006 Li et al proposed a proxy ring signature, which allows proxy signer to sign messages on behalf of the original signer while providing anonymity. At the same conference, Weng et al proposed an ID-based key-insulated signature scheme. In this paper, we point out that the former scheme is not correctly specified. The required hash function H2 should be a map from an elliptic curve to itself. Thus, the additional cost occurs. The latter scheme is insecure because the defined function f(·) is not collision-free. With the exposed temporary signing key in time period t, an adversary can forge signatures in time period t´ if f(U´ID,t´) = f(U´ID,t), where U´ID,t ¿ {1, 2, ¿, n}. In order to overcome this drawback, it suffices to replace f(·) with a hash function, which maps a string onto an elliptic curve.
  • Keywords
    data privacy; digital signatures; public key cryptography; ID-based key-insulated signature; anonymity; elliptic curve; hash function; message signing; proxy ring signature; proxy signer; signature forgery; signature scheme analysis; temporary signing key; Computational intelligence; Costs; Elliptic curve cryptography; Elliptic curves; Hydrogen; Identity-based encryption; Mathematics; Public key; Public key cryptography; Security; Weil pairings; bilinear map; key-insulated signature; proxy ring signature;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Security, 2009. CIS '09. International Conference on
  • Conference_Location
    Beijing
  • Print_ISBN
    978-1-4244-5411-2
  • Type

    conf

  • DOI
    10.1109/CIS.2009.62
  • Filename
    5376508