Untraceability of Two Group Signature Schemes

Slides:



Advertisements
Similar presentations
E W H A W U New Nominative Proxy Signature Scheme for Mobile Communication April Seo, Seung-Hyun Dept. of Computer Science and.
Advertisements

Efficient Signature Generation by Smart Cards Suk Ki Kim Sunyeong Kim.
Spreading Alerts Quietly and the Subgroup Escape Problem Aleksandr Yampolskiy (Yale) Joint work with James Aspnes, Zoë Diamadi, Kristian Gjøsteen, and.
1 Chapter 7-2 Signature Schemes. 2 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants.
Digital Signatures and Hash Functions. Digital Signatures.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
IAW 2006 Cascaded Authorization with Anonymous- Signer Aggregate Signatures Danfeng Yao Department of Computer Science Brown University Joint work with.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Chapter 7-1 Signature Schemes.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
1 An ID-based multisignature scheme without reblocking and predetermined signing order Chin-Chen Chang, Iuon-Chang Lin, and Kwok-Yan Lam Computer Standards.
Identity Base Threshold Proxy Signature Jing Xu, Zhenfeng Zhang, and Dengguo Feng Form eprint Presented by 魏聲尊.
Digital Signatures (DSs) The digital signatures cannot be separated from the message and attached to another The signature is not only tied to signer but.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
1 Lect. 15 : Digital Signatures RSA, ElGamal, DSA, KCDSA, Schnorr.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Digital Cash. p2. OUTLINE  Properties  Scheme  Initialization  Creating a Coin  Spending the Coin  Depositing the Coin  Fraud Control  Anonymity.
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Linkability of Some Blind Signature Schemes Swee-Huay Heng 1, Wun-She Yap 1 Khoongming Khoo 2 1 Multimedia University, 2 DSO National Laboratories.
1 一個新的代理簽章法 A New Proxy Signature Scheme 作 者 : 洪國寶, 許琪慧, 郭淑娟與邱文怡 報 告者 : 郭淑娟.
Cryptanalysis of Some Proxy Signature Schemes without Certificates Wun-She Yap, Swee-Huay Heng Bok-Min Goi Multimedia University.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 14 October 5, 2004.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 11 September 23, 2004.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
ICICS2002, Singapore 1 A Group Signature Scheme Committing the Group Toru Nakanishi, Masayuki Tao, and Yuji Sugiyama Dept. of Communication Network Engineering.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
KNAPSACK公開金鑰密碼學 Algorithms FINITE DEFINITENESS INPUT/OUTPUT GENERALITY
CS580 Internet Security Protocols
Source: The Journal of Systems and Software, Vol. 73, 2004, pp.507–514
Reporter :Chien-Wen Huang
Proxy Blind Signature Scheme
Author : Guilin Wang Source : Information Processing Letters
第四章 數位簽章.
第四章 數位簽章.
Information Security message M one-way hash fingerprint f = H(M)
CS480 Cryptography and Information Security
RSA and El Gamal Cryptosystems
A Novel Group Key Transfer Protocol
Identity-based deniable authentication protocol
Improving Lamport One-time Signature Scheme
Digital signatures.
Public Key Cryptosystems - RSA
Practical E-Payment Scheme
Information Security message M one-way hash fingerprint f = H(M)
Digital Signature Schemes and the Random Oracle Model
Information Security message M one-way hash fingerprint f = H(M)
Enabling Technology1: Cryptography
Digital Signatures…!.
Source: Ad Hoc Networks, Vol. 71, pp , 2018
Digital Signatures.
Bishop: Chapter 10 Key Management: Digital Signature
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
K. Maneva-Jakimoska, G. Jakimoski*and M. Burmester
On the Security of a Group Signature Scheme
Security of Wang-Li Threshold Signature Scheme
Fangguo Zhang and Kwangjo Kim
Security Flaws in a Pairing-based Group Signature Scheme
Published in 2016 International Computer Symposium (ICS) Authors
Lihua Liu† Zhengjun Cao‡
Oblivious Transfer.
A Note on Secure Key Issuing in ID-based Cryptography
On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme Zhengjun Cao Key Lab of Mathematics Mechanization, Academy of Mathematics and.
Untraceability of Wang-Fu Group Signature Scheme
Presentation transcript:

Untraceability of Two Group Signature Schemes Zhengjun Cao† †Institute of Systems Science, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, P.R. China. 100080 zjcamss@hotmail.com Abstract A group signature scheme allows a group member of a given group to sign messages on behalf of the group in an anonymous fashion. In case of a dispute, however, a designated group manager can reveal the signer of a valid group signature. In the paper, we show the untraceability of two group signatures in [1, 5] by new and very simple attacks. Although those flaws, such as, forgeability, untraceability and linkability have been shown in [2, 7, 8, 9], we should point out that our attacks are more simple. Keywords Group signature, Untraceability. 1 Introduction The concept of group signature was introduced by Chaum and Heyst[3], which allow individ- ual members to make signatures on behalf of the group. More formally, a secure group signature scheme must satisfy the following properties[4]: Unforgeability: Only group members are able to sign messages on behalf of the group. Anonymity: Given a valid signature of some message, identifying the actual signer is computationally hard for everyone but the group manager. Traceability: The group manager is always able to open a valid signature and identify the actual signer. Coalition-resistance: A colluding subset or group members (even if comprised of the entire group) cannot generate a valid signature that the group manager cannot link to one of the colluding group members. Unlinkability: Deciding whether two different valid signatures were produced by the same group member is computationally hard. Exculpability: Neither a group member nor the group manager can sign on behalf of other group member. In the paper, we show the untraceability of two group signature schemes in [1, 5] by new and very simple attacks. Although those flaws, such as, forgeability, untraceability and linkability have been shown in [2, 7, 8, 9], we should point out our attacks are more simple. 1

2 Zhang-Wu-Wang group signature scheme Zhang et al. proposed a novel efficient group signature scheme with forward security in [1]. Unfortunately, the scheme is linkable, untraceable and universally forgeable[2]. 2.1 Review of Zhang-Wu-Wang group signature scheme 2.1.1 SETUP The group manager (GM) randomly chooses two large primes p1,p2 of the same size such that p1 = 2p′1 + 1 and p2 = 2p′2 + 1, where both p′1, and p′2 are also primes. Let n = p1p2, and G =< g > be a cyclic subgroup of Z∗n. GM chooses a random integer e which satisfies gcd(e, 0(n)) = 1, and computes d such that de = 1 mod 0(n). Let h(·) be a coalition-resistant hash function. The expected system life-time is divided into T intervals. GM randomly choose an integer x as his secret key and computes the corresponding public key y = gx (mod n). (c, s) = SPKIγ : y = gγ1() denotes the signature of knowledge of loggy on the empty message. Finally, the group manager publishes the public key (y, n, g, e, h(·), IDGM, T), where IDGM is the identity of the group manager. 2.1.2 JOIN If a user, say Bob, wants to join the group, he executes an interactive protocol with GM. Firstly, Bob chooses a random number k E Z∗n as his secret key, and computes his identity IDB = gk mod n. Then Bob generates the signature of knowledge (c, s) = SPKIγ : IDB = gγ1() to show that he knows a secret value k to meet IDB = gk mod n. Finally, Bob keeps k privately and sends (IDB, (c, s)) to the group manager. Upon receiving (IDB, (c, s)), GM firstly verifies the signature of knowledge (c, s). If the verification holds, GM chooses a random number α E Z∗n, and computes a triple (rB, sB, ωB0) from rB = gα mod n, sB = α + rBx, ωB0 = (rBIDGMIDB)−dT mod n. Then GM sends Bob (sB, rB, ωB0 via a private channel, and stores (sB, rB, ωB0) together with (IDB, (c, s) in his local database. After Bob receives (sB,rB,ωB0), he verifies the following relations: gsB = rByrB mod n, and rBIDGMIDB = ω−eT B0 mod n If both the above equations hold, Bob store (sB,rB,ωB0) as his resulting initial membership certificate. 2.1.3 EVOLVE Assume that Bob has the group membership certificate (sB,rB,ωBa) at time period j. Then at time period j+1, he updates his group membership certificate as (sB, rB, ωBa+1) by computing ωBa+1 = (ωBa)e mod n, 2

where wBj = (rBIDGMIDB)−dT −j mod n. 2.1.4 SIGN To sign a message m, Bob randomly chooses two numbers q1, q2 E Z∗n, and computes z1,µ,r1,r2,r3 as follows: z1 = gq1yq2 mod n, µ = h(z1,m), r2 = wµBj mod n, r1 = q1 + (sB + k)µh(r2), r3 = q2 − rBµh(r2) The group signature on m is a = (µ,r1,r2,r3,m,j). 2.1.5 VERIFY Given a = (µ, r1, r2, r3, m,j), a verifier accepts it as a valid group signature on m if and only if µ ≡ h(z′1, m), where z′ 1 is computed by GM gr1rh(r2)eT −j z′ 1 = IDµh(r2) yr3 mod n. 2 2.1.6 OPEN In case of a dispute, GM executes the following procedure: Check the validity of signature a via VERIFY procedure. Compute η = 1/(µh(r2)) mod φ(n). Compute z′ 1 = IDµh(r2) yr3 mod n. Search his database to find a pair (IDB, rB) that satisfies the following equality: rBIDB = (gr1yr3/z′1)η mod n. If there is duple (rB, IDB) satisfying the above equation, GM conclude that IDB is the identity of the actual signer. Otherwise, output I. 2.1.7 REVOKE Omitted (see [1]). 2.2 Untraceability Though the authors claim that the scheme is secure, it is not true. It has been shown that the scheme is linkable, untraceable and universally forgeable in [2]. Now We present a simple and direct attack in the following. It shows the scheme is untraceable from a new point of view. SIGN 3

3 Kim-Park-Won group signature scheme To sign a message m, the group member Bob randomly chooses three numbers q1, q2, t ∈ Z∗ n, and computes z1,µ,r1, r2, r3 as follows: z1 = gq1yq2 mod n, µ = h(z1,m), r2 = ytµωµ Bj mod n, r1 = q1 + (sB + k)µh(r2), r3 = q2 − rBµh(r2) − tµh(r2)eT −j The group signature on m is σ = (µ, r1, r2, r3, m, j). VERIFY Given σ = (µ, r1, r2, r3, m, j), a verifier accepts it as a valid group signature on m if and only if µ ≡ h(zf1, m), where zf1 is computed by GM gr1rh(r2)eT j zf 1 = IDµh(r2) yr3 mod n. 2 Correctness: zf 1 = IDI6Mr2)gr1r2h(r2)eT jyr3 = IDµh(r2)GM (ytµ) Lu h(r2)eT-3 _iih(r2)eT Bj j yq2−rBµh(r2)y−tµh(r2)eT j = ID igir2) gr1ωµh(r2)eT j yq2−rBµh(r2) = IDµh(r2) GM gq1gsBµh(r2)gkµh(r2) (rBIDGMIDB)−µh(r2) yq2y−rBµh(r2) µh(r2) yq2y µh(r2) = IDIAr2)40, rBIDGmIDB) g8 B ph(r 2) gkith(r2) (g8B = gq1yq2 = z1 (mod n) But we have (gr1yr3/zf1)η = gsB+ky−teT j−rB =6rBIDB mod n. Therefore, the scheme is untraceable. Remark: Underlined parts show the differentia between the attack and original scheme. 3 Kim-Park-Won group signature scheme At Asiacrypt’96, Kim.et.al. proposed a convertible group signature[5] based on the scheme of Park et.al.[6]. It is so called K-P-W group signature scheme. However, there exist many weaknesses. For example: Lim and Lee[8] pointed out that the group members can forge and conspire to make a valid signature. Actually, though user Ui cannot obtain GC’s secret key d, he can get ID−d G and gd, where IDG and g are the identity and a public parameter of GC (group center), respectively. The author of [8] pointed out that GC can change a valid signature into another group member’s valid signature in the same message. The authors of [9] have shown 4

Signature verification equation: that GC can produce a valid group signature for any message and then impose it on any group member. [2] has also presented a universal forgery attack. To us surprise, we find that the identifying verification equation in the scheme is identical, that is to say, it has no relation to the actual signer’s secret key of a given valid group signature. 3.1 Review of Kim-Park-Won group signature scheme We first briefly describe the scheme in [5] as follows: Let n = pq = (2fp′ + 1)(2fq′ + 1), where p, q, f, p′, q′ are distinct primes. g has an order of f (i.e. gf = 1 mod n), γ and d are two integers, where γd = 1 mod φ(n), gcd(γ, φ(n)) = 1. Let h, IDG denote a secure hash function and the identity information of group center (GC), respectively. GC publishes (n, r, g, f, h, IDG) as the group public keys and keeps (d, p′, q′) secret. A group member Ui with identity information IDG randomly selects his secret key si ∈ (0, f) and then sends (IDigs% mon n) to GC. GC computes xi = (IDGgs%)−d mod n and sends it to member Ui secretly. member Ui chooses two distinct random integer numbers r1, r2 in [0,f) and computes V = gr1rγ2 mod n. Inputting h with V and message m, he get e = h(V, m). Subsequently, he computes z1 = r1 + sie mod f, z2 = r2xei mod n. Thus he generates the group signature (e, z1, z2) for message m. Signature verification equation: e = h(Vˆ, m) where Vˆ = (IDG)egz1zγ2 mod n Identifying verification equation: gz1 = ( Vˆ r−γ 2 )(gs%)e mod n. where r2 = z2x−e i mod n 3.2 Untraceability Now we show that the identifying verification equation is identical. In fact, for a given valid group signature (e, z1, z2) and an arbitrary group member’s secret key (xj, sj), we have Vˆ (z2x−ej )−γ(gsj)e = Vˆ z−γ 2xeγ j (gsa)e = (IDG)egz1zγ2z−γ2 xeγ j (gsi)e (have no relation to the inner structure of z2) = (IDG)egz1xeγj gsie = (IDGgsj)egz1xeγ j = xj gz1xeγ −eγ j (e is counteracted) = gz1(mod n) (have no relation to the inner structure of z1) Therefore, the identity of the actual signer is untraceable. It’s a serious designing error. 5

4 Conclusion References In this paper, we show the untraceability of two group signature schemes. Our new attacks are different from those in [2, 7, 8, 9]. Obviously, our attacks are more simple and direct. References Jianhong Zhang, Qianhong Wu and Yumin Wang. A novel efficient group signature with forward security. Information and Communications Security (ICICS’03), LNCS 2836, 292-300. Springer- Verlag, 2003. Guilin Wang. On the security of a Group Signature Scheme with Forward Security. http: //eprint.iacr.org/2003/226. D. Chaum and E. van Heyst. Group signatures. In: Advances in Cryptology-EUROCRYPT’91, LNCS 950, 257-265. Springer-Verlag, 1992. G. Ateniese, J.Camenisch, M.Joye, and G.Tsudik. A practical and provably secure coalition-resistant group signature scheme. In: Advances in Cryptology-CRYPTO’2000, LNCS 1880, 255-270. Springer- Verlag, 2000. Kim.S.J., Park.S.J., and Won.D.H., Convertible group signatures, Advances in Cryptology - Asi- acrypt’96, 1996, (Springer). Vol. 1163, pp. 311-321 (Lecture Notes in Computer Science) Park.S.J., Lee.I.S., and Won.D.H., A practical group signature, Proc. JW-ISC’95, Japan, 1995, pp. 127-133 Lim.C.H., and Lee.P.J., Remarks on convertible group of Asiacrypt’96, Electron. Lett., 1997, 33.(5), pp. 383-384 Wang, C.H., Hwang.T.L., and Lee.N.Y., Comments on two group signatures, Inf. Process. Lett., 1999, 69. pp. 95-97 Zichen Li, Yongchuan Wang, Yi Xian Yang and Weilin Wu, Cryptanalysis of convertible group signature, Electron. Lett., 1999, Vol.35, No.13, pp. 1071-1072 6