CRYPTANALYSIS OF A TYPE OF FORWARD SECURE SIGNATURES AND MULTI-SIGNATURES

Jia Yu, Rong Hao, Fanyu Kong, Xiangguo Cheng, Huawei Zhao, and Yangkui Chen

References

  1. [1] R. Anderson, Two remarks on public key cryptology, Invited Lecture, Proc. 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, 1997.
  2. [2] M. Bellare & S. Miner, A forward-secure digital signature scheme, Proc. Cryptology-CRYPTO’99, Santa Barbara, California, USA, 1999, 431–448.
  3. [3] M. Abdalla & L. Reyzin, A new forward-secure digital signature scheme, Proc. Cryptology-ASIACRYPT’00, Kyoto, Japan, 2000, 116–129.
  4. [4] G. Itkis & L. Reyzin, Forward-secure signatures with optimal signing and verifying, Proc. Cryptology-CRYPTO’01, Santa Barbara, California, USA, 2001, 499–514.
  5. [5] A. Kozlov & L. Reyzin, Forward-secure signatures with fast key update, Proc. Security in Communication Networks, Amalfi, Italy, 2002, 247–262.
  6. [6] F. Hu, C.H. Wu, & J.D. Irwin, A new forward secure signature scheme using bilinear maps, Cryptology ePrint Archive, 2003, Available at http://eprint.iacr.org/2003/188.
  7. [7] J. Yu, F.Y. Kong, C.X. Guo, R. Hao, & G.W. Li, Cryptanalysis of Vo-Kim forward secure signature in ICISC 2005, Proc. Second International Conference on Provable Security, Shanghai, China, 2008, 176–184.
  8. [8] X. Boyen, H. Shacham, E. Shen, & B. Waters, Forward secure signatures with untrusted update, Proc. the 13th ACM Conference on Computer and Communications Security, Virginia, USA, 2006, 191–200.
  9. [9] H. Ong & C.P. Schnorr, Fast signature generation with a fiat Shamir-like scheme, Proc. Cryptology-EURCRYPT’90, Aarhus, Denmark, 1990, 432–440.
  10. [10] L.C. Guillou & J.J. Quisquatr, A paradoxical identity-based signature scheme resulting from zero-knowledge, Proc. CryptologyCRYPTO’88, Santa Barbara, United States, 1988, 216–231.
  11. [11] H. Krawczyk, Simple forward-secure signatures for any signature scheme, Proc. the 7th ACM Conference on Computer and Communications Security, Athens, Greece, 2000, 108–115.
  12. [12] T. Maklin, D. Micciancio, & S. Miner, Efficient generic forwardsecure signatures with an unbounded number of time periods, Proc. Cryptology-EUROCRYPT’02, London, UK, 2002, 400– 417.
  13. [13] B. Libert, J. Jacques, & M. Yung, Forward-secure signatures in untrusted update environments: Efficient and generic constructions, Proc. 14th ACM Conference on Computer and Communications Security, Virginia, USA, 2007, 266–275.
  14. [14] N.R. Sunitha & B.B. Amberker, Forward-secure multisignatures, Proc. Distributed Computing and Internet Technology, New Delhi, India, 2008, 89–99.
  15. [15] N.R. Sunitha, B.B. Amberker, & P. Koulgi, Secure e-cheques for joint accounts with collective signing using forward-secure multi-signature scheme, Proc. the Seventh IEEE/ACIS International Conference on Computer and Information Science, Washington, USA, 2008, 241–246.
  16. [16] N.R. Sunitha, B.B. Amberker, & P. Koulgi, Transferable e-cheques: An application of forward-secure serial multisignatures, Proc. Computational Algorithms and Data Analysis, New Delhi, India, 2008, 147–157.
  17. [17] N.R. Sunitha & B.B. Amberker, Some aggregate forward-secure signature schemes, Proc. TENCON 2008, Hyderabad, 2008, 1–6.
  18. [18] N.R. Sunitha & B.B. Amberker, Forward-secure proxy signature scheme for multiple proxy signers using DSA with proxy revocation, Proc. IEEE International Advance Computing Conference, Patiala, 2009, 681–686.

Important Links:

Go Back