Title : 
Analysis of Two Signature Schemes from CIS´2006
         
        
            Author : 
Liu, Lihua ; Cao, Zhengjun
         
        
            Author_Institution : 
Dept. of Math., Shanghai Maritime Univ., Shanghai, China
         
        
        
        
        
        
        
            Abstract : 
In CIS´2006 Li et al proposed a proxy ring signature, which allows proxy signer to sign messages on behalf of the original signer while providing anonymity. At the same conference, Weng et al proposed an ID-based key-insulated signature scheme. In this paper, we point out that the former scheme is not correctly specified. The required hash function H2 should be a map from an elliptic curve to itself. Thus, the additional cost occurs. The latter scheme is insecure because the defined function f(·) is not collision-free. With the exposed temporary signing key in time period t, an adversary can forge signatures in time period t´ if f(U´ID,t´) = f(U´ID,t), where U´ID,t ¿ {1, 2, ¿, n}. In order to overcome this drawback, it suffices to replace f(·) with a hash function, which maps a string onto an elliptic curve.
         
        
            Keywords : 
data privacy; digital signatures; public key cryptography; ID-based key-insulated signature; anonymity; elliptic curve; hash function; message signing; proxy ring signature; proxy signer; signature forgery; signature scheme analysis; temporary signing key; Computational intelligence; Costs; Elliptic curve cryptography; Elliptic curves; Hydrogen; Identity-based encryption; Mathematics; Public key; Public key cryptography; Security; Weil pairings; bilinear map; key-insulated signature; proxy ring signature;
         
        
        
        
            Conference_Titel : 
Computational Intelligence and Security, 2009. CIS '09. International Conference on
         
        
            Conference_Location : 
Beijing
         
        
            Print_ISBN : 
978-1-4244-5411-2
         
        
        
            DOI : 
10.1109/CIS.2009.62