Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005

  • Jia Yu
  • Fanyu Kong
  • Xiangguo Cheng
  • Rong Hao
  • Guowen Li
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5324)


D. L. Vo and K. Kim proposed a forward secure signature scheme from bilinear pairings in annual International Conference on Information Security and Cryptology 2005. They claimed that their scheme satisfies several merits including requiring the general security parameters only independent to the total number of time periods and performing key evolving for unlimited time periods while maintaining sizes of keys and signature fixed. They also claimed this scheme is forward secure under the assumption of computational Diffie-Hellman problem. In this paper, we analyze the security of this scheme and point out this scheme doesn’t satisfy the forward security.


forward security digital signature provable security key exposure 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Anderson, R.: Two remarks on public key cryptology. Invited Lecture. In: The 4th ACM Conference on Computer and Communications Security (1997)Google Scholar
  2. 2.
    Bellare, M., Miner, S.: A forward-secure digital signature scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 431–448. Springer, Heidelberg (1999)Google Scholar
  3. 3.
    Abdalla, M., Reyzin, L.: A new forward-secure digital signature scheme. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 116–129. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  4. 4.
    Itkis, G., Reyzin, L.: Forward-secure signatures with optimal signing and verifying. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 499–514. Springer, Heidelberg (2001)Google Scholar
  5. 5.
    Kozlov, A., Reyzin, L.: Forward-secure signatures with fast key update. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 247–262. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Kang, B.G., Park, J.H., Halm, S.G.: A new forward secure signature scheme. Cryptology ePrint Archive, Report 2004/183 (2004)Google Scholar
  7. 7.
    Camenisch, J., Koprowski, M.: Fine-grained forward-secure signature schemes without ran-dom oracles. Discrete Applied Mathematics 154(2), 175–188 (2006)MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Ong, H., Schnorr, C.P.: Fast signature generation with a fiat Shamir-like scheme. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 432–440. Springer, Heidelberg (1991)Google Scholar
  9. 9.
    Guillou, L.C., Quisquatr, J.J.: A paradoxical identity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216–231. Springer, Heidelberg (1990)Google Scholar
  10. 10.
    Krawczyk, H.: Simple forward-secure signatures for any signature scheme. In: the 7th ACM conference on Computer and Communications Security, pp. 108–115. ACM Press, New York (2000)Google Scholar
  11. 11.
    Maklin, T., Micciancio, D., Miner, S.: Efficient generic forward-secure signatures with an unbounded number of time periods. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 400–417. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  12. 12.
    Boyen, X., Shacham, H., Shen, E., Waters, B.: Forward Secure Signatures with Untrusted Update. In: The 13th ACM conference on Computer and communications security, pp. 191–200. ACM Press, New York (2006)Google Scholar
  13. 13.
    Libert, B., Jacques, J., Yung, M.: Forward-Secure Signatures in Untrusted Update Envi-ronments: Efficient and Generic Constructions. In: The 14th ACM conference on Computer and communications security, pp. 266–275. ACM Press, New York (2007)Google Scholar
  14. 14.
    Vo, D.L., Kim, K.: Yet another forward secure signature from bilinear pairings. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 441–455. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  15. 15.
    Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing effi-cient protocols. In: The First ACM Conference on Computer and Communications Secu-rity, pp. 62–73. ACM Press, New York (1993)Google Scholar
  16. 16.
    Itkis, G.: Forward Security: Adaptive Cryptography-Time Evolution. Invited chapter for the Handbook of Information Security (2005),

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Jia Yu
    • 1
  • Fanyu Kong
    • 2
  • Xiangguo Cheng
    • 1
  • Rong Hao
    • 1
  • Guowen Li
    • 3
  1. 1.College of Information EngineeringQingdao UniversityQingdaoChina
  2. 2.Institute of Network SecurityShandong UniversityJinanChina
  3. 3.School of Computer Science and TechnologyShandong Jianzhu UniversityJinanChina

Personalised recommendations