Untraceability of Wang-Fu Group Signature Scheme

Slides:



Advertisements
Similar presentations
E W H A W U New Nominative Proxy Signature Scheme for Mobile Communication April Seo, Seung-Hyun Dept. of Computer Science and.
Advertisements

Efficient Signature Generation by Smart Cards Suk Ki Kim Sunyeong Kim.
1 Chapter 7-2 Signature Schemes. 2 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
IAW 2006 Cascaded Authorization with Anonymous- Signer Aggregate Signatures Danfeng Yao Department of Computer Science Brown University Joint work with.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
1 An ID-based multisignature scheme without reblocking and predetermined signing order Chin-Chen Chang, Iuon-Chang Lin, and Kwok-Yan Lam Computer Standards.
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
Identity Base Threshold Proxy Signature Jing Xu, Zhenfeng Zhang, and Dengguo Feng Form eprint Presented by 魏聲尊.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 4 Data Authentication Part II.
Digital Signatures (DSs) The digital signatures cannot be separated from the message and attached to another The signature is not only tied to signer but.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
The RSA Algorithm Rocky K. C. Chang, March
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Basel Alomair, Krishna Sampigethaya, and Radha Poovendran University of Washington TexPoint fonts used in EMF.
Topic 22: Digital Schemes (2)
Digital Cash. p2. OUTLINE  Properties  Scheme  Initialization  Creating a Coin  Spending the Coin  Depositing the Coin  Fraud Control  Anonymity.
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
Linkability of Some Blind Signature Schemes Swee-Huay Heng 1, Wun-She Yap 1 Khoongming Khoo 2 1 Multimedia University, 2 DSO National Laboratories.
1 一個新的代理簽章法 A New Proxy Signature Scheme 作 者 : 洪國寶, 許琪慧, 郭淑娟與邱文怡 報 告者 : 郭淑娟.
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Encryption Extensions Model based on Hidden Attribute Certificate LI Yu 1,2,3, ZHAO Yong 1,2,3, GONG Bei 1 1 College of Computer Science and Technology,
ICICS2002, Singapore 1 A Group Signature Scheme Committing the Group Toru Nakanishi, Masayuki Tao, and Yuji Sugiyama Dept. of Communication Network Engineering.
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
Manu Drijvers, Joint work with Jan Camenisch, Anja Lehmann. March 9 th, 2016 Universally Composable Direct Anonymous Attestation.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
Sanitizable Signatures ESORICS 2005, LNCS 3679, pp. 159–177, Springer-Verlag Berlin Heidelberg 2005 Author: Giuseppe Ateniese, Daniel H. Chou, Breno.
KNAPSACK公開金鑰密碼學 Algorithms FINITE DEFINITENESS INPUT/OUTPUT GENERALITY
Outline Primitive Element Theorem Diffie Hellman Key Distribution
CS580 Internet Security Protocols
Source: The Journal of Systems and Software, Vol. 73, 2004, pp.507–514
Proxy Blind Signature Scheme
Author : Guilin Wang Source : Information Processing Letters
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
第四章 數位簽章.
第四章 數位簽章.
Cryptanalysis on Mu–Varadharajan's e-voting schemes
A new ring signature scheme with signer-admission property
An efficient threshold RSA digital signature scheme
Certificateless signature revisited
RSA and El Gamal Cryptosystems
Improving Lamport One-time Signature Scheme
A flexible date-attachment scheme on e-cash
Digital signatures.
Chun-Ta Li 1 Min-Shiang Hwang 2,∗
Practical E-Payment Scheme
Broadcast Encryption Amos Fiat & Moni Naor Advances in Cryptography - CRYPTO ’93 Proceeding, LNCS, Vol. 773, 1994, pp Multimedia Security.
Source: Ad Hoc Networks, Vol. 71, pp , 2018
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
K. Maneva-Jakimoska, G. Jakimoski*and M. Burmester
Security of Wang-Li Threshold Signature Scheme
Fangguo Zhang and Kwangjo Kim
Authors: Yuh-Min TSENG, Tsu-Yang WU, Jui-DiWU
Security Flaws in a Pairing-based Group Signature Scheme
Nominative Proxy Signature Schemes
Published in 2016 International Computer Symposium (ICS) Authors
Lihua Liu† Zhengjun Cao‡
A Note on Secure Key Issuing in ID-based Cryptography
On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme Zhengjun Cao Key Lab of Mathematics Mechanization, Academy of Mathematics and.
Untraceability of Two Group Signature Schemes
Improved Authenticated Multiple-Key Agreement Protocol
Presentation transcript:

Untraceability of Wang-Fu Group Signature Scheme Zhengjun Cao† Lihua Liu‡ †Center of Information Security, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, P.R. China. 100080 zjcamss@hotmail.com ‡ Department of Mathematics, Shanghai Jiaotong University Abstract Wang et al. recently proposed an improved edition based on Tseng-Jan group signature scheme[1]. In the paper, we show that the scheme is untraceable by a simple attack. Keywords group signature scheme, full-anonymity, full-traceability. 1 Introduction Group signatures, introduced by Chaum and Heyst[2], allow individual members to make signatures on behalf of the group. More formally, a secure group signature scheme must satisfy the following properties[6]: Unforgeability: Only group members are able to sign messages on behalf of the group. Anonymity: Given a valid signature of some message, identifying the actual signer is computationally hard for everyone but the group manager. Unlinkability: Deciding whether two different valid signatures were produced by the same group member is computationally hard. Exculpability: Neither a group member nor the group manager can sign on behalf of other group member. Traceability: The group manager is always able to open a valid signature and identify of the actual signer. Coalition-resistance: A colluding subset or group members (even if comprised of the entire group) cannot generate a valid signature that the group manager cannot link to one of the colluding group members. 1

2 Wang-Fu group signature scheme The anonymity and traceability of group signature scheme make it very useful in E-commerce activities[3,4]. Lee and Chang proposed a group signature in 1998[5], but it has serious drawbacks. Hence, Tseng and Jan proposed two improved group signature schemes based on Lee-Chang scheme. Regrettably, their schemes are all insecure, too. Z.C.Li et al. have presented several attacks on them[7,8,9,10,11,12,13]. Incidentally, We have given a new and simple attack in a script. Recently, Wang and Fu proposed a new edition based on Tseng-Jan scheme. In this paper, we show that the new edition is also insecure by a simple attack. It shows that Wang-Fu group signature scheme is untraceable. 2 Wang-Fu group signature scheme 2.1 Setup Pick two large primes p, q, such that q|(p − 1), g E GF(p) is a generator of order q. Open p, q, g as public parameters. Member ui randomly chooses secret key xi E Z∗q, computes public key yi = gxi (mod p). Group manager T randomly chooses secret key xT E Z∗q, computes public key yT = gxT (mod p). Choose a secure Hash function h. 2.2 Join When ui join the group, he executes as follows: T randomly picks ki E Z∗q, computes ri = g−kiyki i (mod p), si = ki − rixT (mod q) sends si, ri to ui in secret, keeps (si, ri, ki) in record. After ui receives (si, ri), he verifies gsiyriT ri =(gsiyri ? T )xi (mod p) If it holds, ui accepts (si, ri). 2

B C FDh(A,C,D,E,F)BD[h(A,C,D,E,F)vi−h(E,D,F)vi+h(E,D,F)] 2.3 Sign Given a message m, ui randomly chooses a, b, d, t E Z∗q, computes C = ria − d (mod q), A = ybi (mod p), D = gb (mod p), E = ra i (1 + g−siay−ria T )xi (mod p), F = ydT (mod p), B = sia − bh(A, C, D, E, F) + bh(E, D, F) (mod q), αi = [Dh(E,D,F) + gByCT FDh(A,C,D,E,F)] (mod p), R = αti (mod p), s = t−1[h(m, R) − xiR] (mod q). The signature is (s, R, A, B, C, D, E, F, m). 2.4 Verify Verifier computes αi = Dh(E,D,F) +gByCT FDh(A,C,D,E,F) (mod p), δi =Ah(E,D,F)[αiD−h(E,D,F) − 1]E (mod p) Check h(m,R) αi = δR ?i Rs (mod p) If it holds, then (s, R, A, B, C, D, E, F, m) is a valid group signature. 2.5 Open Group Manager T who knows (si, ri, ki) of member ui, (i = 1, 2, · · · , n.) computes vi = s−1 i ki (mod q), ωi = gvi (mod p) and checks B C FDh(A,C,D,E,F)BD[h(A,C,D,E,F)vi−h(E,D,F)vi+h(E,D,F)] g yT (mod p) Therefore, he can reveal the signer of (s, R, A, B, C, D, E, F, m). 3

3 Untraceability C = ria − d (mod q), A = ybi (mod p), D = gb (mod p), 2.6 Delete member Omitted. 3 Untraceability In recent, Bellare et al. have pointed out that full-anonymity and full-traceability are two basic requirements of group signature, one can refer to [6] or [14] for more details. Without question, it is an excellent explanation after the concept of group signature has been invented. But we find that the improved scheme is untraceable although it overcomes some drawbacks of original scheme. Attack: Given a message m, member ui randomly picks a, b, d, t E Z∗ q ,ρ E Z∗ q ,computes C = ria − d (mod q), A = ybi (mod p), D = gb (mod p), E = rai (1 + g−siay−ria T )xi (mod p), Fˆ = ydTgρ (mod p), Bˆ = sia − bh(A, C, D, E, Fˆ) + bh(E, D, Fˆ)−ρ (mod q), αi = [Dh(E,D, Fˆ) +gByC TFˆ Dh(A,C,D,E, Fˆ)] (mod p), R = αti (mod p), s = t−1[h(m, R) − xiR] (mod q). The group signature is (s, R, A, ˆB, C, D, E, Fˆ, m). Correctness: Since αi = Dh(E,D, Fˆ) +g ˆByCT FˆDh(A,C,D,E, Fˆ) = gbh(E,D, Fˆ) +gsiag−bh(A,C,D,E, Fˆ)gbh(E,D, Fˆ)g−ρgxT riag−xT dgxT dgρgbh(A,C,D,E, Fˆ) = gbh(E,D, Fˆ)(1 +gsiagxT ria) = gbh(E,D, Fˆ)(1 + gkia) (mod p) δi = Ah(E,D, Fˆ)[αiD−h(E,D, Fˆ) − 1]E (mod p) 4

4 Conclusion References we have =[Ah(E,D, Fˆ)gkiarai (1 +g−siay−ria αH(m,R) = αxiR i αts i =[gbh(E,D, Fˆ)xigkiaxi(1 + g−kia)xi]RRsi =[Ah(E,D, Fˆ)gkiarai (1 +g−siay−ria T )xi]RRs = [Ah(E,D, Fˆ)(αig−bh(E,D, Fˆ) − 1)ra i (1 + g−siay−ria = δRi Rs (mod p) But g Cˆh(A,C,D,E,P) gkia gbh(E,D,P) YT FD (mod p) Bˆ 7,[h(A,C,D,E, Fˆ)vi−h(E,D, Fˆ)vi+h(E,D, Fˆ)] ωi 1J = (gs−1 iki)[sia−bh(A,C,D,E, Fˆ )+bh(E,D, Fˆ )−ρ]gbh(A,C,D,E, Fˆ )s−1 i kig−bh(E,D, Fˆ )s−1 i kigbh(E,D, Fˆ) bh(E,D, Fˆ)ωTρ (mod p) = gi gˆByCT FˆD h(A C D E D[h(A,C,D,E, Fˆ)vi−h(E,D, Fˆ)vi+h(E,D, Fˆ)] (mod p) It means that the scheme is untraceable. ( Underlined parts show the differentia between the attack and the original scheme!! ) Remark The two attacks presented in [7] on original Tseng-Jan group signature scheme are applied to the new edition. But our attack is more simple because it only needs to choose another random number ρ. 4 Conclusion In the paper, we analyze Wang-Fu group signature scheme, and show its untraceability by a simple attack. We hold that the structure of Tseng-Jan group signature is too loose to withstand any attacks. Various editions of the scheme have been studied in [7, 8, 9, 10, 11, 12, 13]. It’s easy to see that the scheme has no any specialities whether in setup phase or in open phase. So, we think that it’s no necessary to make any improvements of it. References Xiaoming Wang, Fangwei Fu. A Secure Group Signature Scheme. Journal of Elecetronics and Infor-mation (in Chinese), 2003 Vol.25 No.5. pp.657-663. D.Chaum, F.Heyst. Group Signatures. Proc. EUROCRYPT’91, 1992, pp.257-265. 5

G. Maitland and C. Boyd. Fair electronic cash based on a group signature scheme In: Information Security and Cryptography (ICICS 2001), LNCS 2229, pp. 461-465, Springer-Verlag: 2001. S. Canard and J. Traore. On Fair E-cash Systems Based on Group Signature Schemes. In: Informa-tion Security and Privacy (ACISP’03), LNCS 2727, pp. 237-248. Berlin: Springer-Verlag, 2003. W.Lee, C. Chang. Efficient Group Signature Scheme Based on the Discrete Logarithm. IEE Pro. Comput. Digital Techniques. 1998, 145(1), pp.15-18. M. Bellare, D. Micciancio, B. Warinschi. Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. EUROCRYPT 2003. LNCS 2656, pp.614-629, 2003. Guilin Wang. Security of Several Group Signature Schemes. http://eprint.iacr.org/2003/194. Z.C.Li, L.C.K.Hui, et al. Security of Tseng-Jan’s Group Signature Schemes. Information Processing Letters, 2000, 75(5), 187-189. M. Joye, N-Y. Lee, and T. Hwang. On the security of the Lee-Chang group signature scheme and its derivatives. In: Information Security (ISW’99), LNCS 1729, pp. 47-51. Springer-Verlag, 1999. H. Sun. Comment: Improved group signature scheme based on discrete logarithm problem. Elec-tronics Letters, 1999, 35(13): 1323-1324. Y.-M. Tseng and J.-K. Jan. Improved group signature scheme based on the discrete logarithm problem. Electronics Letters, 1999, 35(1): 37-38. Y.-M. Tseng and J.-K. Jan. Reply: improved group signature scheme based on discrete logarithm problem. Electronics Letters, 1999, 35(13): 1324-1325. Guilin Wang and Sihan Qing. Security Flaws in Several Group Signatures Proposed by Popescu. Cryptology ePrint archive, report 2003/207, Sep 2003. http://eprint.iacr.org/2003/207. Mihir Bellare and Haixia Shi and Chong Zhang. Foundations of Group Signatures: The Case of Dynamic Groups. http://eprint.iacr.org/2004/077. 6