کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
427417 686503 2014 9 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Security weaknesses of a signature scheme and authenticated key agreement protocols
ترجمه فارسی عنوان
ضعف های امنیتی یک طرح امضا و پروتکل های توافقنامه تایید کلید
کلمات کلیدی
رمزنگاری، هویت مبتنی بر، امضای قطعی، امضای جمع تأیید اعتبار کلید، توافقنامه کلیدی دو جانبه
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
چکیده انگلیسی


• Selvi et al.ʼs deterministic ID-based signature scheme is universally forgeable.
• Okamotoʼs AKA protocol is vulnerable to the key-compromise impersonation attack.
• Hölbl et al.ʼs ID-based AKA protocol is vulnerable to the unknown key-share attack.

At ACISP 2012, a novel deterministic identity-based (aggregate) signature scheme was proposed that does not rely on bilinear pairing. The scheme was formally proven to be existentially unforgeable under an adaptive chosen message and identity attack. The security was proven under the strong RSA assumption in the random oracle model. In this paper, unfortunately, we show that the signature scheme is universally forgeable, i.e., an adversary can recover the private key of a user and use it to generate forged signatures on any messages of its choice having on average eight genuine signatures. This means, that realizing a deterministic identity-based signature scheme in composite order groups is still an open problem. In addition, we show that a preliminary version of the authenticated key exchange protocol proposed by Okamoto in his invited talk at ASIACRYPT 2007 is vulnerable to the key-compromise impersonation attack and therefore cannot be secure in the eCK model. We also show that the two-party identity-based key agreement protocol of Hölbl et al. is vulnerable to the unknown key-share attack.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Information Processing Letters - Volume 114, Issue 3, March 2014, Pages 107–115
نویسندگان
,