Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Security analysis of an identity-based strongly unforgeable signature scheme

Published: 01 December 2014 Publication History

Abstract

Identity-based signature (IBS) is a specific type of public-key signature (PKS) where any identity string ID can be used for the public key of a user. Although an IBS scheme can be constructed from any PKS scheme by using the certificate paradigm, it is still important to construct an efficient IBS scheme with short signature under the standard assumption without relying on random oracles. Recently, Kwon proposed an IBS scheme and claimed its strong unforgeability under the computational Diffie-Hellman (CDH) assumption. In this paper, we show that the security proof of Kwon is seriously flawed. To show the flaws, we first show that there exists a distinguisher that can distinguish the distribution of simulated signatures from that of real signatures. Next, we also show that the simulator of Kwon's security argument cannot extract the solution of the CDH problem even if there exists an adversary that forges the signature. Therefore, the security of the Kwon's IBS scheme is not related to the hardness of the CDH assumption.

References

[1]
Bellare, M., Namprempre, C. and Neven, G., Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J. (Eds.), LNCS, vol. 3027. Springer. pp. 268-286.
[2]
Boneh, D. and Boyen, X., Efficient selective-id secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J. (Eds.), LNCS, vol. 3027. Springer. pp. 223-238.
[3]
Chatterjee, S. and Sarkar, P., Hibe with short public parameters without random oracle. In: Lai, X., Chen, K. (Eds.), LNCS, vol. 4284. Springer. pp. 145-160.
[4]
Galindo, D., Herranz, J. and Kiltz, E., On the generic construction of identity-based signatures with additional properties. In: Lai, X., Chen, K. (Eds.), LNCS, vol. 4284. Springer. pp. 178-193.
[5]
Gentry, C. and Silverberg, A., Hierarchical id-based cryptography. In: Zheng, Y. (Ed.), LNCS, vol. 2501. Springer. pp. 548-566.
[6]
Kwon, S., An identity-based strongly unforgeable signature without random oracles from bilinear pairings. Inform. Sci. v276. 1-9.
[7]
Paterson, K.G. and Schuldt, J.C.N., Efficient identity-based signatures secure in the standard model. In: Batten, L.M., Safavi-Naini, R. (Eds.), LNCS, vol. 4058. Springer. pp. 207-222.
[8]
Shamir, A., Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (Eds.), LNCS, vol. 196. Springer. pp. 47-53.
[9]
V. Shoup, Sequences of games: a tool for taming complexity in security proofs, Cryptology ePrint Archive, Report 2004/332, 2004. <http://eprint.iacr.org/2004/332>.
[10]
Shoup, V., A Computational Introduction to Number Theory and Algebra. 2009. Cambridge University Press.
[11]
Efficient identity-based encryption without random oracles. In: Cramer, R. (Ed.), LNCS, vol. 3494. Springer. pp. 114-127.
  1. Security analysis of an identity-based strongly unforgeable signature scheme

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Information Sciences: an International Journal
    Information Sciences: an International Journal  Volume 286, Issue
    December, 2014
    246 pages

    Publisher

    Elsevier Science Inc.

    United States

    Publication History

    Published: 01 December 2014

    Author Tags

    1. Bilinear map
    2. Cryptography
    3. Identity-based signature
    4. Security analysis
    5. Strongly unforgeability

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Dec 2024

    Other Metrics

    Citations

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media