On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme Zhengjun Cao Key Lab of Mathematics Mechanization, Academy of Mathematics and.

Slides:



Advertisements
Similar presentations
E W H A W U New Nominative Proxy Signature Scheme for Mobile Communication April Seo, Seung-Hyun Dept. of Computer Science and.
Advertisements

Rennes, 24/10/2014 Cristina Onete CIDRE/ INRIA Privacy in signatures. Hiding in rings, hiding in groups.
Efficient Signature Generation by Smart Cards Suk Ki Kim Sunyeong Kim.
1 Chapter 7-2 Signature Schemes. 2 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
IAW 2006 Cascaded Authorization with Anonymous- Signer Aggregate Signatures Danfeng Yao Department of Computer Science Brown University Joint work with.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
1 A practical off-line digital money system with partially blind signatures based on the discrete logarithm problem From: IEICE TRANS. FUNDAMENTALS, VOL.E83-A,No.1.
Chapter 7-1 Signature Schemes.
Identity Base Threshold Proxy Signature Jing Xu, Zhenfeng Zhang, and Dengguo Feng Form eprint Presented by 魏聲尊.
Digital Signatures (DSs) The digital signatures cannot be separated from the message and attached to another The signature is not only tied to signer but.
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
Topic 22: Digital Schemes (2)
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Linkability of Some Blind Signature Schemes Swee-Huay Heng 1, Wun-She Yap 1 Khoongming Khoo 2 1 Multimedia University, 2 DSO National Laboratories.
1 一個新的代理簽章法 A New Proxy Signature Scheme 作 者 : 洪國寶, 許琪慧, 郭淑娟與邱文怡 報 告者 : 郭淑娟.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Cryptanalysis of Some Proxy Signature Schemes without Certificates Wun-She Yap, Swee-Huay Heng Bok-Min Goi Multimedia University.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
A Simple Traceable Pseudonym Certificate System for RSA-based PKI SCGroup Jinhae Kim.
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
Key Management Network Systems Security Mort Anvari.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
ICICS2002, Singapore 1 A Group Signature Scheme Committing the Group Toru Nakanishi, Masayuki Tao, and Yuji Sugiyama Dept. of Communication Network Engineering.
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
KNAPSACK公開金鑰密碼學 Algorithms FINITE DEFINITENESS INPUT/OUTPUT GENERALITY
CS580 Internet Security Protocols
Source: The Journal of Systems and Software, Vol. 73, 2004, pp.507–514
Reporter :Chien-Wen Huang
Proxy Blind Signature Scheme
A Realistic Secure Anonymous E-voting Protocol Based on ElGamal Scheme
Key Substitution Attacks on Some Provably Secure Signature Schemes
Author : Guilin Wang Source : Information Processing Letters
Cryptanalysis on Mu–Varadharajan's e-voting schemes
Boneh-Franklin Identity Based Encryption Scheme
An efficient threshold RSA digital signature scheme
Anonymous Wireless Authentication on a Portable Cellular Mobile System
Chapters 14,15 Security.
A flexible date-attachment scheme on e-cash
Digital signatures.
Public Key Cryptosystems - RSA
Practical E-Payment Scheme
Digital Signatures…!.
Key Management Network Systems Security
Digital Signatures.
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
Chapters 14,15 Security.
K. Maneva-Jakimoska, G. Jakimoski*and M. Burmester
Chapter 13 Digital Signature
Anonymous Credentials
Security of Wang-Li Threshold Signature Scheme
Fangguo Zhang and Kwangjo Kim
Security Flaws in a Pairing-based Group Signature Scheme
Cryptology Design Fundamentals
Lihua Liu† Zhengjun Cao‡
A Note on Secure Key Issuing in ID-based Cryptography
A Distributed Sign-and-Encryption for Anonymity
Cryptography Lecture 26.
Untraceability of Wang-Fu Group Signature Scheme
Untraceability of Two Group Signature Schemes
Public-Key Cryptography Quadratic Residues and „Rabin Lock“
Presentation transcript:

On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme Zhengjun Cao Key Lab of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, P.R. China. 100080 zjcamss@hotmail.com ( Graduate School of Chinese Academy of Sciences) Abstract In the paper, we analyze two signature schemes. The first is a (t3, t, n) threshold group signature scheme proposed by Shi and Feng in [1]. The second is a fair blind signature scheme proposed by Feng in [2]. Our results show that both schemes are forgeable. Besides, we introduce a concept, i.e., suspended factor, to describe the common error in designing signature scheme, which means that some signature data lie at neither base position nor exponent position in verifying equation, instead lie at factor position solely. Keywords threshold group signature scheme, fair blind signature scheme, uni-versal forgeability, suspended factor. 1 Shi-Feng threshold group signature scheme Group signatures, introduced by Chaum and Heyst[3], allow individual members to make signa-tures on behalf of the group. More formally, a secure group signature scheme must satisfy the fol-lowing properties[4]: unforgeability, anonymity, unlinkability, exculpability, traceability, coalition-resistance. For more details, one can refer to [4]. In 2000, Shi and Feng proposed a variant group signature scheme, i.e., (t3, t, n) threshold group signature scheme[1]. Here we omit the background and requirements of the model. We care naught for them, instead we care for its universal forgeability. We show the scheme is universally forgeable by a simple and direct attack. 1.1 Review of the threshold group signature scheme The model consists of four entities: group manager (GM), signature compiler (DC), group members, verifier. Setup (1) (a) GM picks a hash function H(·), p, q satisfying 2511 < p < 2512, 2159 < q < 2160 and q|(p−1). 1

Pick h ∈ Z∗p, set α = h(p−1)/q mod p, (α =6 1). Hence, α is of order q. Choose fj(x) = aj0+aj1x+· · ·+aj,nj−1xna−1 mod q, satisfying 0 < aj,i< q, j = 1,2, · · · , l, i ∈ [0,nj − 1]. Set fdj (x) = fj(x) mod xd, where d ∈ [1,nj]. Compute Y = Ql αfi(0) mod p. j=1 GM opens {H(x), p, q, α, Y }, keeps h in secret, and sends fj(x) to DC. (2) Group member Ui ∈ Aj chooses ci ∈ [1, q − 1], computes xi = αci mod p, keeps ci in secret, and sends{xi,j} to GM. (3) GM picks li ∈ [1, q − 1], computes idi = αlixi mod p, ydi= αfdj (idi) mod p udi = (lixi + Midi)) mod q, Fj(x) = fJ 3 i∈Aj (x − idi) mod q GM keeps li in secret, sends {idi,ydi ,udi } to Ui, Fj(x) to DC, and takes idi as Ui’s identity. Sign Given a message m, if member Ui wants to sign it, then he picks ki ∈ [1, q − 1], computes ri = αki mod p, sends the pre-signature {idi, j,ri} to DC. DC checks FJ(idi) = 0 mos q. If it holds, then DC collects pre-signatures of Aj, denoted by Bj, where Bj consists of Tj members, the number of pre-signatures denoted by T. DC checks Tj ≥ tj, T ≥ t. If it holds, then computes: Rj = Yri mod p, Ej = H(m,Rj) mod q, gj(x) = Y(x − idi) mod q i∈Bi i∈Bi DC keeps Rj in secret, broadcasts {j,gj(x),Ej}. Member Ui checks gj(idi) = 0 mod q. If it holds, then Ui computes: dj = ∂0(gj(x)), Gji(0) = (−(idig0 j(idi))−1gj(0)) mod q, si = (udj i Gji(0) + kiEj) mod q where dj = Tj, gj(x) is the derivative of gj(x). (4) Ui keeps Gji(0) in secret, sends his partial signature {idi, si, ydj i } to DC. DC computes Gji(0), checks αsi = (idiydi i )Gji(0)rEj i mod p If it fails, DC rejects it. After DC collects partial signatures, he computes S = Xl j=1 X i∈B, si modq, ID = Yl j=1 II i∈Bi idGji i (0) mod p, g(x) = gj(x) mod q sends the threshold group signature {S, ID,g(x),Rj,Ej|(j = 1,· · · ,l)}. 2

(m,{S, ID, g(x), Rj|(j = 1, · · · ,l)1) Verify Verifier checks αS = Y x ID x Yl j=1 E • R. 3 mod p 3 Open Given a valid threshold group signature (m, {S, ID, g(x), Rj, Ej|(j = 1, · · · , l)1), GM only needs to find each idi in the members’ list for g(idi) = 0 mod q 1.2 Analysis The authors claim that the security of the signature scheme is based on DLP, but we find it is false. Here we present a simple and direct attack on it, only according to the verifying phase. As far as the possible faults in the whole description of algorithm (see [1]) and other possible attacks, we do care nought for them. First, we observe that there are some redundant data Ej|(j = 1, · · · , l) among the signature data {S, ID, g(x),Rj, Ej|(j = 1, · · · ,l)1. In fact, the appropriate signature is of the form: (m,{S, ID, g(x), Rj|(j = 1, · · · ,l)1) The appropriate verifying equation is of the form: αS = Y x ID x Yl j=1 H(m R ) R. , 3 mod p 3 Secondly, we introduce a simple and direct attack on it in the following. Universal forgeability: Adversary only needs to randomly pick λj E Z∗p (j = 1, · · · , l) and ω E Z∗q, computes: Rj = λj (j = 1, · · · ,l) S = ω ID = αS(Y n H. (m,Rj))−1 mod p 1-L3 where Y, α are public parameters of the group, m is a given message. The correctness of the forged group signature is easy to check. Now we introduce a concept suspended factor to describe the error which occurs in the verifying equation. For example, ID in above verifying equation does lie at neither base position nor exponent position. It lies at a factor position solely. 3

←−(Ao, SigTC(A0 k 0)) αi =6 αj, i =6 j ←−(αi, SigTC(Ai k i)) Ai = Aαi 2 Feng fair blind signature scheme Blind signature was introduced by Chaum in 1982. For more details of the model, one can refer to [5, 6, 7]. Feng proposed a fair blind signature scheme in [2]. The author’s claim that the security of the scheme is equivalent to that of the scheme proposed by Camenisch et al.[6] is false. In the following, we first review the scheme. Then we point out some errors in the description. At last, we show that an attacker with the certificate authorized by the Trustable Center (TC) can directly forge blind signatures. 2.1 Review of Feng fair blind signature scheme The scheme consists three entities: Signer, Requester and Trusted center (TC). TC randomly picks large primes p, q such that q|(p − 1), an integer α ∈ Z∗p of order q. Signer randomly picks a secret key x, opens his public key y = αx (mod p). Register: Requester TC pickA0∈Z∗ q, αi∈Z∗q (request)−→ (∗) ←−(Ao, SigTC(A0 k 0)) αi =6 αj, i =6 j ←−(αi, SigTC(Ai k i)) Ai = Aαi Ai = Aαi 0 (1 ≤ i ≤ k) .. ←−(αk, SigTC(Akkk)) record(A0, A1, · · ·,Ak) Sign: Requester Signer checkSigTC(A0 11 0) (A0, SigTC(A0 11 0)) αi ∈ {α1, α2, · · · ,αk} ←− ezze= Ax0 Z = ezαi ek ∈R z∗q a,b ∈R zq∗←− (er1, er2) r1 = αek , er2= Aek0 er = er1er2 mod p r1 =era 1αb mod p r2 = erαia 2 Abi mod p r = r1r2 mod p me = amr−1er mod q me −→ es = (xer + s=(esrer+bm) mod q ek em)mod q (∗∗) ←−es 4

The signature of message m is (Ai, SigTC(Ai i), z, r, s). Verify: Check SigTC(Ai i), Check (Aiα)s = ?(yz)rrm. If it holds, accept the signature, otherwise reject it. 2.2 Analysis An error in setup phase The system parameter A0 E Z∗q(see underlined part (*)) picked by TC is a fault. By the later verifying equation, we know that A0 should be of same order with α, i.e., q. Mend: TC chooses A0 E Z∗ p such that A0 is of order q. Verifying equation does not hold left = (Aiα)s = (Aiα) -sr-r+bm = (Aiα)(x-r+-k -m)r-r+bm = (Aiα)xr-r2+-kam-r2+bm (mod p) right = (yz)rrm = (αxAαix 0 )r(r1r2)m = (Aiα)xr(er1aαb · er2αiaAbi)m = (Aiα)xr((er1 er2αi)(Aiα)b)m = (Aiα)xr+bm(er1 er2αi)am= (Aiα)xr+bm(Aiα)-kam = (Aiα)xr+bm+-kam (mod p) =6 left Mend: Substitute s = (esrer−1 + bm) mod q for the underlined part(**). Requester’s attack The author claimed the security of the scheme is equivalent to that of the scheme proposed by Carmenisch et al. in [6]. This is false. In a sense, two signature schemes have comparability of the form. But the new scheme has a more datum z which destroys the security of total protocol. Given a message m, Requester Ui can forge blind signature after he obtains Ai from TC. He only needs to: pick ω1, ω2 ER Z∗q , compute z = y−1(Aiα)ω1 (mod p), r = (Aiα)ω2 (mod p), s = ω1(Aiα)ω2 + ω2m (mod q) 5

3 Conclusion References The blind signature of message m is (Ai, SigTC(Ai l i), z, r, s). Correctness: Checking for SigTC(Aili) is obvious. We only need to check (Aiα)s?=(yz)rrm. In fact, (yz)rrm = [yy−1(Aiα)ω1](Aiα)ω2 [(Aiα)ω2]m = (Aiα)ω1(Aiα)ω2+ω2m = (Aiα)s (mod p) 3 Conclusion In the paper, we analyze Shi-Feng threshold group signature scheme and Feng fair blind signa- ture scheme. Our results show that both schemes are forgeable. Besides, we introduce a concept suspended factor to describe the common error in designing signature scheme, which means a sig- nature datum lying at neither base position nor exponent position in verifying equation, instead at factor position solely. Incidently, as far as modifications of the two schemes, we care naught for them. We only care for that both two schemes are fragile. References Shi Yi, Feng Dengguo. The Design and analysis of a new group of (tj, t, n) threshold group signature scheme. ChinaCrypt’2000. PP.149-152. Feng Dengguo. Blind signature schemes based on DLP problem. Privacy of Communication (China) 1997 (1), pp. 31-34. D.Chaum, F.Heyst. Group Signatures. Proc. EUROCRYPT’91, 1992, pp.257-265. M. Bellare, D. Micciancio, B. Warinschi. Foundations of Group Signatures: Formal Definitions, Sim-plified Requirements, and a Construction Based on General Assumptions. EUROCRYPT 2003. LNCS 2656, pp.614-629, 2003. D. Chaum. Blind Signature for Untraceable Payments. In: Advances in cryptology, proc.crypto’82. New York, 1983. pp. 199-203. Carmenisch J L et al. Blind signatures based on the discrete logarithm problem. Rump session of Eurocrypt’94, Perugid: Italy, 1994. M. Stadler et al., Fair Blind Signatures. In: Advances in cryptology, proc. Eurocrypt’95. New York, 1995. pp. 209-219. 6