Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Security analysis of an identity-based strongly unforgeable signature scheme

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Kwangsu-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-05T02:18:09Z-
dc.date.available2021-09-05T02:18:09Z-
dc.date.created2021-06-15-
dc.date.issued2014-12-01-
dc.identifier.issn0020-0255-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/96553-
dc.description.abstractIdentity-based signature (IBS) is a specific type of public-key signature (PKS) where any identity string ID can be used for the public key of a user. Although an IBS scheme can be constructed from any PKS scheme by using the certificate paradigm, it is still important to construct an efficient IBS scheme with short signature under the standard assumption without relying on random oracles. Recently, Kwon proposed an IBS scheme and claimed its strong unforgeability under the computational Diffle-Hellman (CDH) assumption. In this paper, we show that the security proof of Kwon is seriously flawed. To show the flaws, we first show that there exists a distinguisher that can distinguish the distribution of simulated signatures from that of real signatures. Next, we also show that the simulator of Kwon's security argument cannot extract the solution of the CDH problem even if there exists an adversary that forges the signature. Therefore, the security of the Kwon's IBS scheme is not related to the hardness of the CDH assumption. (C) 2014 Elsevier Inc. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE INC-
dc.subjectRANDOM ORACLES-
dc.subjectENCRYPTION-
dc.titleSecurity analysis of an identity-based strongly unforgeable signature scheme-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Kwangsu-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1016/j.ins.2014.07.022-
dc.identifier.scopusid2-s2.0-84906706176-
dc.identifier.wosid000342253900003-
dc.identifier.bibliographicCitationINFORMATION SCIENCES, v.286, pp.29 - 34-
dc.relation.isPartOfINFORMATION SCIENCES-
dc.citation.titleINFORMATION SCIENCES-
dc.citation.volume286-
dc.citation.startPage29-
dc.citation.endPage34-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.subject.keywordPlusRANDOM ORACLES-
dc.subject.keywordPlusENCRYPTION-
dc.subject.keywordAuthorCryptography-
dc.subject.keywordAuthorIdentity-based signature-
dc.subject.keywordAuthorStrongly unforgeability-
dc.subject.keywordAuthorSecurity analysis-
dc.subject.keywordAuthorBilinear map-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE