Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005

  • Authors:
  • Jia Yu;Fanyu Kong;Xiangguo Cheng;Rong Hao;Guowen Li

  • Affiliations:
  • College of Information Engineering, Qingdao University, Qingdao, China 266071;Institute of Network Security, Shandong University, Jinan, China 250100;College of Information Engineering, Qingdao University, Qingdao, China 266071;College of Information Engineering, Qingdao University, Qingdao, China 266071;School of Computer Science and Technology, Shandong Jianzhu University, Jinan, China 250101

  • Venue:
  • ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

D. L. Vo and K. Kim proposed a forward secure signature scheme from bilinear pairings in annual International Conference on Information Security and Cryptology 2005. They claimed that their scheme satisfies several merits including requiring the general security parameters only independent to the total number of time periods and performing key evolving for unlimited time periods while maintaining sizes of keys and signature fixed. They also claimed this scheme is forward secure under the assumption of computational Diffie-Hellman problem. In this paper, we analyze the security of this scheme and point out this scheme doesn't satisfy the forward security.