Abstract
In this paper, we cryptanalyze an identity-based convertible undeniable signature scheme which claimed to be secure under the random oracle model. Our result shows that the signature leaks information on signer identity and fails to provide both invisibility and anonymity under the known message attack. We propose a fix for the vulnerability by removing some information from the signature with the need for the signer to keep the record of every signed message.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boyar, J., Chaum, D., Damgård, I., Pedersen, T.: Convertible undeniable signatures. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 189–205. Springer, Heidelberg (1991). doi:10.1007/3-540-38424-3_14
Chaum, D., van Antwerpen, H.: Undeniable signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212–216. Springer, New York (1990). doi:10.1007/0-387-34805-0_20
Chaum, D., Heijst, E., Pfitzmann, B.: Cryptographically strong undeniable signatures, unconditionally secure for the signer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 470–484. Springer, Heidelberg (1992). doi:10.1007/3-540-46766-1_38
Galbraith, S.D., Mao, W.: Invisibility and anonymity of undeniable and confirmer signatures. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 80–97. Springer, Heidelberg (2003). doi:10.1007/3-540-36563-X_6
Huang, X., Mu, Y., Susilo, W., Wu, W.: Provably secure pairing-based convertible undeniable signature with short signature length. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 367–391. Springer, Heidelberg (2007). doi:10.1007/978-3-540-73489-5_21
Libert, B., Quisquater, J.-J.: Identity based undeniable signatures. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 112–125. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24660-2_9
Wu, W., Mu, Y., Susilo, W., Huang, X.: Provably secure identity-based undeniable signatures with selective and universal convertibility. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007. LNCS, vol. 4990, pp. 25–39. Springer, Heidelberg (2008). doi:10.1007/978-3-540-79499-8_4
Acknowledgment
The authors would like to thank the Malaysia government’s Fundamental Research Grant Scheme (FRGS/2/2014/ICT04/MMU/03/1) and (FRGS/1/2015/ICT04/MMU/03/5) for supporting this work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Behnia, R., Tan, SY., Heng, SH. (2017). Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme. In: Phan, RW., Yung, M. (eds) Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology. Mycrypt 2016. Lecture Notes in Computer Science(), vol 10311. Springer, Cham. https://doi.org/10.1007/978-3-319-61273-7_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-61273-7_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-61272-0
Online ISBN: 978-3-319-61273-7
eBook Packages: Computer ScienceComputer Science (R0)