Abstract
To enjoy the property of error tolerance in the biometric identities extraction, the fuzzy identitybased signature has been initialized to issue a signature on behalf of a descriptive attributes set ω instead of a single string. Any attributes set ω′ can be used to verify the validity of the signature in case the distance between ω and ω′ is less than a pre-defined threshold. Recently, Wang re-formalized the notion of fuzzy identitybased signature and proposed a concrete pairing-based construction along with the efficiency analysis and formal security proof. Unfortunately, by giving concrete attack, we indicate that Wang’s scheme is not secure against forgery attack. We also present an improved scheme to prevent this attack.
Similar content being viewed by others
References
Tian H B, Zhang F G, Chen X F, et al. Selectively unforgeable but existentially forgeable signature schemes and applications. Sci China Inf Sci, 2013, 56: 012107
Shi J J, Shi R H, Guo Y, et al. Batch proxy quantum blind signature scheme. Sci China Inf Sci, 2013, 56: 052115
Wang F H, Hu Y P, Wang B C. Lattice-based linearly homomorphic signature scheme over binary field. Sci China Inf Sci, 2013, 56: 112108
Diffie W, Hellman M E. New directions in cryptography. IEEE Trans Inf Theory, 1976, IT-22: 644–654
Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 1984, LNCS 196. Berlin: Springer-Verlag, 1985. 47–53
Hess F. Efficient identity based signature schemes based on pairings. In: Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography, LNCS 2595. Berlin: Springer-Verlag, 2003. 310–324
Xing D S, Cao Z F, Dong X L. Identity based signature scheme based on cubic residues. Sci China Inf Sci, 2011, 54: 2001–2012
Chai Z C, Cao Z F, Dong X L. Identity-based signature scheme based on quadratic residues. Sci China Inf Sci, 2007, 50: 373–380
Sahai A, Waters B. Fuzzy identity-based encryption. In: Proceedings of EUROCRYPT 2005, LNCS 3494. Berlin: Springer-Verlag, 2005. 457–473
Yang P Y, Cao Z F, Dong X L. Fuzzy identity based signature with applications to biometric authentication. Comput Electr Eng, 2011, 37: 532–540
Wang C J. A provable secure fuzzy identity based signature scheme. Sci China Inf Sci, 2012, 55: 2139–2148
Shamir A. How to share a secret. Commun ACM, 1979, 22: 612–613
Baek J, Zheng Y. Identity-based threshold decryption. In: Proceedings of PKC 2004, LNCS 2947. Berlin: Springer-Verlag, 2004. 262–276
Baek J, Zheng Y. Identity-based threshold signature scheme from the bilinear pairings. In: Proceedings of IEEE Int Conf Information Technology: Coding and Computing (ITCC’ 04), Las Vegas, 2004. 124–128
Author information
Authors and Affiliations
Corresponding author
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Xiong, H., Chen, Y., Zhu, G. et al. Analysis and improvement of a provable secure fuzzy identity-based signature scheme. Sci. China Inf. Sci. 57, 1–5 (2014). https://doi.org/10.1007/s11432-014-5152-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-014-5152-2