Anonymous identification and designated-verifiers signatures from insecure batch verification

  • Authors:
  • Sherman S. M. Chow;Duncan S. Wong

  • Affiliations:
  • Department of Computer Science, Courant Institute of Mathematical Sciences, New York University, NY;Department of Computer Science, City University of Hong Kong, Hong Kong, China

  • Venue:
  • EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Versatility in cryptography is interesting. Instead of building a secure scheme from another secure one, this paper presents an oxymoron making use of the insecurity of a scheme to give useful feature in another context. We show the insecurity of the batch verification algorithms in Cui et al.'s work about an identity-based (ID-based) signature scheme. Following Chow et al.'s idea in EuroPKI 2005, we turn such attack into a secure ID-based ring signature scheme. We also showhowto add linkability. We present two applications of our scheme, which are a short ID-based strong designated verifier signature scheme and an ID-based ad-hoc anonymous identification scheme, with an extension secure against a concurrent man-in-the-middle attack.