• Articles • Previous Articles     Next Articles

Forgeability of Wang-Tang-Li s ID-Based Restrictive Partially Blind Signature Scheme

Sheng-Li Liu{1,4, Xiao-Feng Chen2, and Fang-Guo Zhang3   

  1. 1Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China 2Department of Computer Science, School of Information Science and Technology, Sun Yat-Sen University, Guangzhou 510275, China 3Department of Electronics and Communication Engineering, School of Information Science and Technology, Sun Yat-Sen University, Guangzhou 510275, China 4State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
  • Received:2007-06-15 Revised:2007-11-20 Online:2008-03-15 Published:2008-03-10

Restrictive partially blind signature (RPBS) plays an important role in designing secure electronic cash system. Very recently, Wang, Tang and Li proposed a new ID-based restrictive partially blind signature (ID-RPBS) and gave the security proof. In this paper, we present a cryptanalysis of the scheme and show that the signature scheme does not satisfy the property of {unforgeability} as claimed. More precisely, a user can forge a valid message-signature pair $({\it ID}, {\it msg}, {\bf info'}, \sigma')$ instead of the original one $({\it ID}, {\it msg}, {\bf info}, \sigma)$, where {\bf info} is the original common agreed information and ${\bf info}'\neq {\bf info}$. Therefore, it will be much dangerous if Wang-Tang-Li's ID-RPBS scheme is applied to the off-line electronic cash system. For example, a bank is supposed to issue an electronic coin (or bill) of \$100 to a user, while the user can change the denomination of the coin (bill) to any value, say \$100\,000\,000, at his will.

Key words: data-summarizing technique; performance evaluation; DSM system; confidence interval; benchmarking;



[1] Chaum D. Blind signatures for untraceable payments. In -\it Proc. Crypto'82}, Rivest R L, Sherman A, Chaum D (eds.), New York: Santa Barbara, California, USA, Plenum Press, 1983, pp.199--203.

[2] Brands S. Untraceable off-line cash in wallet with observers. In -\it Proc. Advances in Cryptology $($Crypto93$)$}, Stinson D R (ed.), Santa Barbara, California, USA, -\it Lecture Notes in Computer Science}, Vol. 773, Springer-Verlag, Berlin, Heidelberg, New York, 1993, pp.302--318.

[3] Chan A, Frankel Y, Tsiounis Y. Easy come easy go divisible cash. In -\it Proc. Advances in Cryptology $($EUROCRYPT 98$)$}, Kaisa Nyberg (ed.), Espoo, Finland, -\it Lecture Notes in Computer Science}, Vol. 1403, Springer-Verlag, 1998, pp.561--576.

[4] Boyd C, Foo E, Pavlovski C. Efficient electronic cash using batch signatures. In -\it Proc. Australasian Conference on Information Security and Privacy $($ACISP'99$)$}, Pieprzyk J, Safavi-Naini R, Seberry J (eds.), Wollongong, NSW, Australia, -\it Lecture Notes in Computer Science}, Vol. 1587, Springer-Verlag, 1999, pp.244--257.

[5] Nyang D, Song J. Preventing double-spent coins from revealing user's whole secret. In -\it Proc. Second International Conference on Information Security and Cryptology $($ICISC'99$)$}, Song J S (ed.), Seoul, Korea, -\it Lecture Notes in Computer Science}, Vol. 1787, Springer-Verlag, 1999, pp.13--20.

[6] Abe M, Fujisaki E. How to date blind signatures. In -\it Proc. Advances in Cryptology $($ASIACRYPT'96$)$}, Kyongju, South Korea, -\it LNCS} 1163, 1996, pp.244--251.

[7] Huang H, Chang C. A new design of efficient partially blind signature scheme. -\it The Journal of Systems and Software}, 2003, 73(3): 397--403.

[8] Cao T, Lin D, Xue R. A randomized RSA-based partially blind signature scheme for electronic cash. -\it Computers and Security}, 2005, 24(1): 44--49.

[9] Zhang F, Chen X. Cryptanalysis of Huang-Chang partially blind signature scheme. -\it The Journal of Systems and Software}, 2005, 76(3): 323--325.

[10] Martinet G, Poupard G, Sola P. Cryptanalysis of a partially blind signature scheme or how to make \$100 bills with \$1 and \$2 ones. In -\it Proc. Financial Cryptography 2006}, -\it LNCS} 4107, Springer-Verlag, Anguilla, British West Indies, 2006, pp.171--176.

[11] Maitland G, Boyd C. A provably secure restrictive partially blind signature. In -\it Proc. the 5th Int. Workshop on Practice and Theory in Public Key Cryptosystems}, Paris, France, -\it LNCS} 2274, Springer-Verlag, 2002, pp.99--114.

[12] Abe M, Okamoto T. Provably secure partially blind signatures. In -\it Proc. Advances in Cryptology --Crypto'2000}, Santa Barbara, CA, USA, -\it LNCS} 1880, Springer-Verlag, 2000, pp.271--286.

[13] Chen X, Zhang F, Mu Y, Susilo W. Efficient provably secure restrictive partially blind signatures from bilinear pairings, -\it Financial Cryptography and Date Security 06}, -\it LNCS} 4107, Springer-Verlag, 2006, pp.251--265.

[14] Shamir A. Identity-based cryptosystems and signature schemes. In -\it Proc. Advances in Cryptology --CRYPTO'84}, Santa Barbara, CA, USA, -\it LNCS} 196, Springer-Verlag, 1985, pp.47--53.

[15] Chen X, Zhang F, Liu S. ID-based restrictive partially blind signatures and applications. -\it Journal of System and Software}, 2007, 80(2): 164--171.

[16] Wang C, Tang Y, Li Q. ID-based fair off-line electronic cash system with multiple banks. -\it Journal of Computer Science and Technology}, 2007, 22(3): 487--493.

[17] Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. -\it Journal of Cryptology: The Journal of the International Association for Cryptologic Research}, 2000, 12(3): 361--396.
[1] Jian-Bin Fang, Xiang-Ke Liao, Chun Huang, De-Zun Dong. Performance Evaluation of Memory-Centric ARMv8 Many-Core Architectures:A Case Study with Phytium 2000+ [J]. Journal of Computer Science and Technology, 2021, 36(1): 33-43.
[2] Farrukh Nadeem, Rizwan Qaiser. An Early Evaluation and Comparison of Three Private Cloud Computing Software Platforms [J]. , 2015, 30(3): 639-654.
[3] Gilad Katz, Asaf Shabtai, Lior Rokach, and Nir Ofek. ConfDTree:Statistical Methods for Improving Decision Trees [J]. , 2014, 29(3): 392-407.
[4] Ning-Hui Sun (孙凝辉), Member, CCF, IEEE, Jing Xing (邢晶), Zhi-Gang Huo (霍志刚), Member, CCF, ACM, Guang-Ming Tan. Dawning Nebulae: A PetaFLOPS Supercomputer with a Heterogeneous Structure [J]. , 2011, 26(3): 352-362.
[5] Juan A. Sánchez, Rafael Marín-Pérez, and Pedro M. Ruiz. Beacon-Less Geographic Routing in Real Wireless Sensor Networks [J]. , 2008, 23(3): 438-450 .
[6] Zhen-Hua Huang, Jian-Kui Guo, Sheng-Li Sun, and Wei Wang. Efficient Optimization of Multiple Subspace Skyline Queries [J]. , 2008, 23(1): 103-111 .
[7] Pierre Bourque, Serge Oligny, Alain Abran, and Bertrand Fournier. Developing Project Duration Models in Software Engineering [J]. , 2007, 22(3): 348-357 .
[8] Wei-Wu Hu, Ji-Ye Zhao, Shi-Qiang Zhong, Xu Yang, Elio Guidetti, and Chris Wu. Implementing a 1GHz Four-Issue Out-of-Order Execution Microprocessor in a Standard Cell ASIC Methodology [J]. , 2007, 22(1): 1-0.
[9] Lei Shi, Ying-Jie Han, Xiao-Guang Ding, Lin Wei and Zhi-Min Gu. An SPN-Based Integrated Model for Web Prefetching and Caching [J]. , 2006, 21(4): 482-489 .
[10] PANG Bin (庞 斌), SHAO HuaiRong (邵怀荣)2 and GAO Wen (高 文). An Admission Control Scheme for End-to-End Statistical QoS Provision in IP Networks [J]. , 2003, 18(3): 0-0.
[11] HU Weiwu(胡伟武),ZHANG Fuxin(张福新)and LIU Haiming(刘海明). Dynamic Data Prefetching in Home-Based Software DSMs [J]. , 2001, 16(3): 0-0.
[12] SHI Weisong; TANG Zhimin; SHI Jinsong;. Using Confidence interval to Summarize the Evaluating Results of DSM Systems [J]. , 2000, 15(1): 73-83.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Liu Mingye; Hong Enyu;. Some Covering Problems and Their Solutions in Automatic Logic Synthesis Systems[J]. , 1986, 1(2): 83 -92 .
[2] Chen Shihua;. On the Structure of (Weak) Inverses of an (Weakly) Invertible Finite Automaton[J]. , 1986, 1(3): 92 -100 .
[3] Gao Qingshi; Zhang Xiang; Yang Shufan; Chen Shuqing;. Vector Computer 757[J]. , 1986, 1(3): 1 -14 .
[4] Chen Zhaoxiong; Gao Qingshi;. A Substitution Based Model for the Implementation of PROLOG——The Design and Implementation of LPROLOG[J]. , 1986, 1(4): 17 -26 .
[5] Huang Heyan;. A Parallel Implementation Model of HPARLOG[J]. , 1986, 1(4): 27 -38 .
[6] Min Yinghua; Han Zhide;. A Built-in Test Pattern Generator[J]. , 1986, 1(4): 62 -74 .
[7] Tang Tonggao; Zhao Zhaokeng;. Stack Method in Program Semantics[J]. , 1987, 2(1): 51 -63 .
[8] Min Yinghua;. Easy Test Generation PLAs[J]. , 1987, 2(1): 72 -80 .
[9] Zhu Hong;. Some Mathematical Properties of the Functional Programming Language FP[J]. , 1987, 2(3): 202 -216 .
[10] Li Minghui;. CAD System of Microprogrammed Digital Systems[J]. , 1987, 2(3): 226 -235 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved