On the security of two identity-based signature schemes based on pairings

ID-based signature enables users to verify signatures using only public identifier. Very recently, Rossi and Schmid (2015) 9 proposed two identity-based signature schemes along with the application to group communications. Unfortunately, by proposing concrete attack, we demonstrate that the former scheme is insecure against forgery attack, while the latter scheme has been totally broken in the sense that the signing key can be recovered from the valid signature easily. ID-based signature enables users to verify signatures using only public identifier.Rossi and Schmid proposed two provably-secure ID-based signature schemes recently.We show that both schemes are insecure against the forgery and key disclosure attack.

[1]  Daoxu Chen,et al.  Correlations between characteristics of maximum influence and degree distributions in software networks , 2013, Science China Information Sciences.

[2]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[5]  Craig Gentry,et al.  Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing , 2007, CCS '07.

[6]  D. Boneh,et al.  Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.

[7]  Kyung-Ah Shim,et al.  A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[8]  Zhiguang Qin,et al.  Analysis and improvement of a provable secure fuzzy identity-based signature scheme , 2014, Science China Information Sciences.

[9]  Kenneth G. Paterson,et al.  ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..

[10]  Reihaneh Safavi-Naini,et al.  An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.

[11]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[12]  Ling Tian,et al.  Identity-Based Authentication for Cloud Computing , 2009, CloudCom.

[13]  Giovanni Schmid,et al.  Identity-based secure group communications using pairings , 2015, Comput. Networks.