A new attack against the selvi-vivek-rangan deterministic identity based signature scheme from ACISP 2012

2Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In ACISP 2012, Selvi, Vivek and Rangan claimed that they proposed the first fully deterministic identity based signature scheme, based on which they also proposed the first fully aggregate identity based signature scheme with no prior communication among different signers. Under the strong RSA assumption, they showed their schemes could resist the adaptive chosen message and adaptive chosen identity attack in the random oracle model. However, Nose gave a universal attack to recover the private key successfully recently. In this paper, we independently present a new universal attack to show there is an alternative way to forge a valid signature on any message instead of using the legal signing procedure with the original private key. The new attack appears more simple, and efficient both in theory and practice. What's more, with our attack, the mistake in the original security proof can be easily pointed out. Such mistake should be avoided in other similar security proofs. © 2014 Springer International Publishing Switzerland.

Cite

CITATION STYLE

APA

Pan, Y., & Deng, Y. (2014). A new attack against the selvi-vivek-rangan deterministic identity based signature scheme from ACISP 2012. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8544 LNCS, pp. 148–161). Springer Verlag. https://doi.org/10.1007/978-3-319-08344-5_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free