Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification
نویسندگان
چکیده
An ad-hoc anonymous identification scheme is a new multiuser cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove membership anonymously in such groups. Recently, Nguyen [11] proposed an ID-based ad-hoc anonymous identification scheme from bilinear pairings. However, in this paper, we propose an attack on Nguyen’s ID-based ad-hoc anonymous identification scheme. We show that any one can impersonate a valid group member to perform the anonymous identification protocol successfully. Furthermore, we propose a solution to improve this scheme against our attack.
منابع مشابه
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05
An ad-hoc anonymous identification scheme is a new multiuser cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove membership anonymously in such groups. Recently, Nguyen [11] proposed an ID-based ad-hoc anonymous identification scheme from bilinear pairings. However, in this paper, we propose an attack on Nguyen’s ID-based ad-hoc anonymou...
متن کاملA Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups
We present an adaptive chosen-plaintext cryptanalysis of Boneh, et al.’s bilinear spontaneous anonymous ad hoc group signature. Then we present a patch, and an extension to a threshold version complete with a security proof in the random oracle model (ROM).
متن کاملAccumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation
We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constructing an identitybased (ID-based) ring signature scheme with constant-size signatures and its interactive counterpart, and providing membership revocation to group signature, traceable signature and identity escrow sc...
متن کاملAnonymous ID-based Group Key Agreement scheme applied in Virtual Private Ad Hoc Networks
As more and more mobile devices interconnect through largescale IP networks, new network architectures become important. A Virtual Private Ad Hoc Network (VPAN) provides such an architecture in which network virtualisation and ad hoc networking techniques are combined. A VPAN consists of a distributed set of entities of which the composition can change over time. This dynamic membership is self...
متن کاملAnonymous E-voting System Based on Id-based Ring Signature
The design of an electronic voting system has been a hot research topic in the area of information security. Based on ID-based ring signature, blind signature, multi-verification technology and existed typical electronic voting models, an improved anonymous electronic voting system is designed. We proved that the new system has good properties of security: anonymity, eligibility, fairness, nonr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005