2014
DOI: 10.1504/ijict.2014.057968
|View full text |Cite
|
Sign up to set email alerts
|

On the security of an enhanced signature scheme

Abstract: Currently, short signature is receiving significant attention since it is particularly useful in low-bandwidth communication environments. However, most of the short signature schemes are only based on one intractable assumption. Recently, Su presented an identity-based short signature scheme based on knapsack and bilinear pairing. He claimed that the signature scheme is secure in the random oracle model. Unfortunately, in this paper, we show that his scheme is insecure. Concretely, an adversary can forge a va… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
0
0
Order By: Relevance
“…This method can be applied to construct hierarchical identity-based encryption that is secure in standard model. In recent years, many lattice-based cryptosystems such as lattice-based group signature scheme [6], lattice-based blind signature scheme [7], lattice-based ring signature scheme [8], lattice-based threshold ring signature scheme [9], lattice-based proxy signature schemes [10,11,12], verifiably encrypted signature scheme [13] and strong designate verifier signature scheme [14] are proposed successively. However, most existing digital multi-signature schemes [15,16,17] are designed on the Integer Factorization Problem, the Discrete Logarithm Problem and so on.…”
Section: Introductionmentioning
confidence: 99%
“…This method can be applied to construct hierarchical identity-based encryption that is secure in standard model. In recent years, many lattice-based cryptosystems such as lattice-based group signature scheme [6], lattice-based blind signature scheme [7], lattice-based ring signature scheme [8], lattice-based threshold ring signature scheme [9], lattice-based proxy signature schemes [10,11,12], verifiably encrypted signature scheme [13] and strong designate verifier signature scheme [14] are proposed successively. However, most existing digital multi-signature schemes [15,16,17] are designed on the Integer Factorization Problem, the Discrete Logarithm Problem and so on.…”
Section: Introductionmentioning
confidence: 99%