On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing
نویسندگان
چکیده
Featured with anonymity and spontaneity, ring signature has been widely adopted in various environments to offer anonymous authentication. To simplify the certificate management in traditional public key infrastructure (PKI) and solve the inherent key escrow problem in the Identity-based cryptography, Qin et al. propose a pairingfree ring signature scheme in the certificate-based cryptosystem recently. Unfortunately, we demonstrate that their scheme is not secure against the malicious certificate authority (CA) and key replacement attacks by giving concrete attack. Concretely, a malicious certificate authority (CA) can forge a signature on arbitrary message in name of any user’s identity and a uncertified user is also able to forge a message.
منابع مشابه
A Provably Secure Certificate Based Ring Signature Without Pairing
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certificatebased encryption lies in implicit certificate and no private key escrow. This feature is desirable especially for the efficiency and the real spontaneity of ring signature, which involve a large number of public keys in each execution. In this paper, we propose an efficient certificatebased ...
متن کاملConvertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملA certificate-based proxy signature with message recovery without bilinear pairing
In this paper, we propose the first provable secure certificate-based proxy signature with message recovery without bilinear pairing. The notion of certificate-based cryptography was initially introduced by Gentry in 2003, in order to simplify certificate management in traditional public key cryptography (PKC) and to solve the key escrow problem in identity-based cryptosystems. To date, a numbe...
متن کاملProvably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model
Similar to certificateless cryptography, certificate-based cryptography is another novel public key setting which combines the merits of traditional public key cryptography (PKC) and identity-based cryptography (IBC). Both certificateless cryptography and certificate based cryptography do not have the key escrow problem in identity-based cryptography, and greatly reduce the overhead of certific...
متن کاملE cient and Provably Secure Identity Based Aggregate Signature Schemes With Partial and Full Aggregation
An identity based signature allows users to sign their documents using their private keys and the signature can be verified by any user by using the identity of the signer and public parameters of the system. This allows secure communication between the users without any exchange of certificates. An aggregate signature scheme is a digital signature scheme which allows aggregation of di erent si...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 17 شماره
صفحات -
تاریخ انتشار 2015