Cryptanalysis of an Efficient Hierarchical Identity Based Signature Scheme in the Standard Model

Hierarchical identity based signature generalizes the concept of identity based signature to organization hierarchy. Till now, there are many interesting hierarchical identity based signature schemes. At ChinaCrypt'08, Ren and Gu claimed to construct an efficient hierarchical identity based signature scheme based on the q-SDH problem with full security in the standard model. They claimed their scheme has short public parameters, high efficiency and a tight reduction. But in this paper we give an attack to their scheme to show their scheme is not secure.

[1]  A. Lewko,et al.  Fully Secure HIBE with Short Ciphertexts , 2009 .

[2]  Tsz Hon Yuen,et al.  Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles , 2006, IACR Cryptol. ePrint Arch..

[3]  Craig Gentry,et al.  Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.

[4]  Siu-Ming Yiu,et al.  Secure Hierarchical Identity Based Signature and Its Application , 2004, ICICS.

[5]  Ben Lynn,et al.  Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.

[6]  Tsz Hon Yuen,et al.  Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles , 2005, IACR Cryptol. ePrint Arch..

[7]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[8]  Kenneth G. Paterson,et al.  ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..

[9]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[10]  Craig Gentry,et al.  Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.

[11]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[12]  Dan Boneh,et al.  Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.

[13]  Tsz Hon Yuen,et al.  Efficient Hierarchical Identity Based Signature in the Standard Model , 2007, IACR Cryptol. ePrint Arch..

[14]  Brent Waters,et al.  Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..

[15]  Yanli Ren,et al.  Efficient hierarchical identity based signature scheme in the standard model , 2008, Wuhan University Journal of Natural Sciences.

[16]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[17]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.