Abstract
A forward secure blind signature scheme was proposed by Duc, Cheon and Kim, in ICICS 2003. The security of the scheme was proved to be equivalent to the strong RSA assumption in the random oracle model. In this paper we present an attack to the scheme by forging valid signatures with public keys only. The attack is so efficient that forging a valid signature needs less computation than legally generating a signature, even considering only the user side. Our result implies that the security proof of the scheme must be invalid. Furthermore we point out the fault of the proof and explain why it invalidates the proof.
Chapter PDF
Similar content being viewed by others
References
Anderson, R.: Two Remarks on Public Key Cryptography, Invited Lecture. In: Fourth Annual Conference on Computer and Communications Security. ACM, New York (1997)
Abdalla, M., Reyzin, L.: A new forward-secure digital signature scheme. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, p. 116. Springer, Heidelberg (2000)
Bao, F., Deng, R.H., Mao, W.: Efficient and practical fair exchange protocols with off-line TTP. In: IEEE Symposium on Security and Privacy, pp. 77–85. IEEE Computer Society Press, Los Alamitos (1998)
Bellare, M., Miner, S.K.: A Forward-Secure Digital Signature Scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 431–448. Springer, Heidelberg (1999)
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM CCS 1993, November 1993, pp. 62–73 (1993)
Chaum, D.: Blind Signatures For Untraceable Payments. In: Advances in Cryptology - CRYPTO 1982, pp. 199–204. Plenum Publishing (1982)
Canetti, R., Goldreich, O., Halevi, S.: The Random Oracle Methodology, Revisited (Extend abstract). In: Proc. of the 30th ACM Symp. on Theory of Computing - STOC 1998, pp. 209–218 (1998)
Duc, D.N., Cheon, J.H., Kim, K.: A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 11–21. Springer, Heidelberg (2003)
Desmedt, Y.G., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)
Desmedt, Y., Frankel, Y., Yung, M.: Multi-receiver/Multi-sender network security: efficient authenticated multicast/feedback. In: Proceedings of IEEE Infocom 1992, pp. 2045–2054 (1992)
Günther, C.: An Identity-based Key-exchange Protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 29–37. Springer, Heidelberg (1990)
Guillou, L.S., Quisquater, J.J.: A Practical Zero-Knowledge Protocol Fitted to Security Microprocessors Minimizing both Transmission and Memory. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 123–128. Springer, Heidelberg (1988)
Itkis, G., Reyzin, L.: Forward-Secure Signatures with Optimal Signing and Verifying. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 332–354. Springer, Heidelberg (2001)
Mao, W., Boyd, C.: Towards Formal Analysis of Security Protocols. In: Proceedings of the 4-th Computer Security Foundations Workshop, Franconia, New-Hampshire (June 1993)
Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31–53. Springer, Heidelberg (1993)
Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology 13(3), 361–396 (2000); The full version of the authors. Security proofs for Signature Schemes. In: Eurocrypt 1996 and Provably Secure Blind Signature Schemes. In: Asiacrypt 1996
De Santis, A., Desmedt, Y., Frankel, Y., Yung, M.: How to share a function securely. In: Proceedings of 26th STOC, pp. 522–533 (1994)
Wong, S., Wei, V.K.: A method for imposing spending limit on electronic coins. In: Proceedings of Int’l Symp. on Information Theory (1998)
Zhang, F., Kim, K.: ID-Based Blind Signature and Ring Signature from Pairings. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 533–547. Springer, Heidelberg (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, S., Bao, F., Deng, R.H. (2005). Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. In: Qing, S., Mao, W., López, J., Wang, G. (eds) Information and Communications Security. ICICS 2005. Lecture Notes in Computer Science, vol 3783. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11602897_5
Download citation
DOI: https://doi.org/10.1007/11602897_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30934-5
Online ISBN: 978-3-540-32099-9
eBook Packages: Computer ScienceComputer Science (R0)