Galindo-Garcia Identity-Based Signature, Improved
نویسندگان
چکیده
In Africacrypt 2009, Galindo and Garcia proposed a lightweight identity-based signature (IBS) scheme based on the Schnorr signature. The construction is simple and claimed to be the most efficient IBS till date. The security is argued, primarily, by using the MultipleForking (MF) Algorithm which is used to launch nested replay attack on the adversary and, consequently, contradict the discrete-log assumption. However, this security argument was shown to be flawed, and subsequently fixed, by Chatterjee et al.. The resulting security, though, is still quite loose with a tightness gap of O ( q ) (where q denotes the bound on the number of queries to the random oracle). The loss of tightness is, in fact, inherited from the MF Algorithm. In this paper, we contemplate a better security bound for GalindoGarcia IBS (GG-IBS). To this end, we introduce two notions pertaining to the simulation of random oracles: “dependency” and “independency”. The notion of independency follows naturally for GG-IBS; dependency, on the other hand, has to be induced by modifying the construction of the protocol in a clever manner. It turns out that the two notions can be applied in conjunction, and this leads to the nested replay attack being launched far more effectively than using the MF Algorithm. As a result, the effective degradation is reduced to O ( q ) . The non-trivial aspect is to leverage these two notions in the security argument.
منابع مشابه
A Lightweight Identity Based Signature Scheme
We present a new identity based signature scheme that is secure against existential forgery on adaptively chosen message and identity attacks. The security is proven in the Random Oracle Model under the discrete logarithm assumption. The new scheme does not use pairings and is arguably the most efficient identity-based signature scheme known to date.
متن کاملA Schnorr-Like Lightweight Identity-Based Signature Scheme
The use of concatenated Schnorr signatures [Sch91] for the hierarchical delegation of public keys is a well-known technique. In this paper we carry out a thorough analysis of the identity-based signature scheme that this technique yields. The resulting scheme is of interest since it is intuitive, simple and does not require pairings. We prove that the scheme is secure against existential forger...
متن کاملImproved identity-based identification using correcting codes
In this paper, a new identity-based identification scheme based on error-correcting codes is proposed. Two well known code-based schemes are combined : the signature scheme by Courtois, Finiasz and Sendrier and an identification scheme by Stern. A proof of security for the scheme in the Random Oracle
متن کاملGalindo-Garcia Identity-Based Signature Revisited
In Africacrypt 2009, Galindo-Garcia [11] proposed a lightweight identity-based signature (IBS) scheme based on the Schnorr signature. The construction is simple and claimed to be the most efficient IBS till date. The security is based on the discrete-log assumption and the security argument consists of two reductions: B1 and B2, both of which use the multiple-forking lemma [4] to solve the disc...
متن کاملOn the Generic Construction of Identity-Based Signatures with Additional Properties
It has been demonstrated by Bellare, Neven, and Namprempre (Eurocrypt 2004) that identity-based signature schemes can be generically constructed from standard digital signature schemes. In this paper we consider the following natural extension: is there a generic construction of “identity-based signature schemes with additional properties” (such as identity-based blind signatures, verifiably en...
متن کامل