DocumentCode
510200
Title
Analysis of Two Signature Schemes from CIS´2006
Author
Liu, Lihua ; Cao, Zhengjun
Author_Institution
Dept. of Math., Shanghai Maritime Univ., Shanghai, China
Volume
1
fYear
2009
fDate
11-14 Dec. 2009
Firstpage
405
Lastpage
408
Abstract
In CIS´2006 Li et al proposed a proxy ring signature, which allows proxy signer to sign messages on behalf of the original signer while providing anonymity. At the same conference, Weng et al proposed an ID-based key-insulated signature scheme. In this paper, we point out that the former scheme is not correctly specified. The required hash function H2 should be a map from an elliptic curve to itself. Thus, the additional cost occurs. The latter scheme is insecure because the defined function f(·) is not collision-free. With the exposed temporary signing key in time period t, an adversary can forge signatures in time period t´ if f(U´ID,t´) = f(U´ID,t), where U´ID,t ¿ {1, 2, ¿, n}. In order to overcome this drawback, it suffices to replace f(·) with a hash function, which maps a string onto an elliptic curve.
Keywords
data privacy; digital signatures; public key cryptography; ID-based key-insulated signature; anonymity; elliptic curve; hash function; message signing; proxy ring signature; proxy signer; signature forgery; signature scheme analysis; temporary signing key; Computational intelligence; Costs; Elliptic curve cryptography; Elliptic curves; Hydrogen; Identity-based encryption; Mathematics; Public key; Public key cryptography; Security; Weil pairings; bilinear map; key-insulated signature; proxy ring signature;
fLanguage
English
Publisher
ieee
Conference_Titel
Computational Intelligence and Security, 2009. CIS '09. International Conference on
Conference_Location
Beijing
Print_ISBN
978-1-4244-5411-2
Type
conf
DOI
10.1109/CIS.2009.62
Filename
5376508
Link To Document