Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification

نویسندگان

  • Fangguo Zhang
  • Xiaofeng Chen
چکیده

An ad-hoc anonymous identification scheme is a new multiuser cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove membership anonymously in such groups. Recently, Nguyen [11] proposed an ID-based ad-hoc anonymous identification scheme from bilinear pairings. However, in this paper, we propose an attack on Nguyen’s ID-based ad-hoc anonymous identification scheme. We show that any one can impersonate a valid group member to perform the anonymous identification protocol successfully. Furthermore, we propose a solution to improve this scheme against our attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05

An ad-hoc anonymous identification scheme is a new multiuser cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove membership anonymously in such groups. Recently, Nguyen [11] proposed an ID-based ad-hoc anonymous identification scheme from bilinear pairings. However, in this paper, we propose an attack on Nguyen’s ID-based ad-hoc anonymou...

متن کامل

A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups

We present an adaptive chosen-plaintext cryptanalysis of Boneh, et al.’s bilinear spontaneous anonymous ad hoc group signature. Then we present a patch, and an extension to a threshold version complete with a security proof in the random oracle model (ROM).

متن کامل

Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation

We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constructing an identitybased (ID-based) ring signature scheme with constant-size signatures and its interactive counterpart, and providing membership revocation to group signature, traceable signature and identity escrow sc...

متن کامل

Anonymous ID-based Group Key Agreement scheme applied in Virtual Private Ad Hoc Networks

As more and more mobile devices interconnect through largescale IP networks, new network architectures become important. A Virtual Private Ad Hoc Network (VPAN) provides such an architecture in which network virtualisation and ad hoc networking techniques are combined. A VPAN consists of a distributed set of entities of which the composition can change over time. This dynamic membership is self...

متن کامل

Anonymous E-voting System Based on Id-based Ring Signature

The design of an electronic voting system has been a hot research topic in the area of information security. Based on ID-based ring signature, blind signature, multi-verification technology and existed typical electronic voting models, an improved anonymous electronic voting system is designed. We proved that the new system has good properties of security: anonymity, eligibility, fairness, nonr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005