DocumentCode :
510200
Title :
Analysis of Two Signature Schemes from CIS´2006
Author :
Liu, Lihua ; Cao, Zhengjun
Author_Institution :
Dept. of Math., Shanghai Maritime Univ., Shanghai, China
Volume :
1
fYear :
2009
fDate :
11-14 Dec. 2009
Firstpage :
405
Lastpage :
408
Abstract :
In CIS´2006 Li et al proposed a proxy ring signature, which allows proxy signer to sign messages on behalf of the original signer while providing anonymity. At the same conference, Weng et al proposed an ID-based key-insulated signature scheme. In this paper, we point out that the former scheme is not correctly specified. The required hash function H2 should be a map from an elliptic curve to itself. Thus, the additional cost occurs. The latter scheme is insecure because the defined function f(·) is not collision-free. With the exposed temporary signing key in time period t, an adversary can forge signatures in time period t´ if f(U´ID,t´) = f(U´ID,t), where U´ID,t ¿ {1, 2, ¿, n}. In order to overcome this drawback, it suffices to replace f(·) with a hash function, which maps a string onto an elliptic curve.
Keywords :
data privacy; digital signatures; public key cryptography; ID-based key-insulated signature; anonymity; elliptic curve; hash function; message signing; proxy ring signature; proxy signer; signature forgery; signature scheme analysis; temporary signing key; Computational intelligence; Costs; Elliptic curve cryptography; Elliptic curves; Hydrogen; Identity-based encryption; Mathematics; Public key; Public key cryptography; Security; Weil pairings; bilinear map; key-insulated signature; proxy ring signature;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Security, 2009. CIS '09. International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-5411-2
Type :
conf
DOI :
10.1109/CIS.2009.62
Filename :
5376508
Link To Document :
بازگشت