Show simple item record

dc.contributor.authorFu, Yen-Kang
dc.contributor.authorChang, Jonathan
dc.contributor.authorJao, David
dc.date.accessioned2024-04-05 13:47:23 (GMT)
dc.date.available2024-04-05 13:47:23 (GMT)
dc.date.issued2022-11-19
dc.identifier.urihttps://doi.org/10.1007/978-3-031-21280-2_28
dc.identifier.urihttp://hdl.handle.net/10012/20422
dc.description.abstractThe Boneh-Boyen digital signature scheme is a pairing-based signature scheme that features short signatures consisting of one group element, the minimum possible size. In contrast to earlier short signature schemes such as Boneh-Lynn-Shacham, the Boneh-Boyen scheme achieves security without the use of random oracles, but at the cost of a non-standard mathematical assumption, the q-Strong Diffie-Hellman (or q-SDH) assumption, which is known to be less secure than discrete logarithms against generic attacks. However, unlike discrete logarithms, in which the fastest known generic attacks match the known provable lower bounds for solving generic discrete logarithms, the fastest known generic attacks against Boneh-Boyen prior to this work did not match the provable lower bounds for generically solving q-SDH instances. In this work, we demonstrate that when p-1 has suitably sized divisors (where p is the order of the underlying group used in the scheme), which in particular almost always occurs for cryptographic pairings instantiated from elliptic curves, Boneh-Boyen can indeed be broken in the sense of weak existential forgery under chosen-message attack (the same security definition as what was used in the original Boneh-Boyen paper) in O(p¹ᐟ³) time using generic algorithms, matching the provable lower bound for generically solving q-SDH instances.en
dc.description.sponsorshipNSERC || Cryptoworks 21 || Public Works and Government Services Canada || Canada First Research Excellence Fund || Royal Bank of Canadaen
dc.language.isoenen
dc.publisherSpringer-Verlagen
dc.relation.ispartofseriesLecture Notes in Computer Science;13620
dc.subjectpairing-based cryptographyen
dc.subjectBoneh-Boyen signaturesen
dc.titleOptimal generic attack against basic Boneh-Boyen signaturesen
dc.typeArticleen
dcterms.bibliographicCitationFu, Y.-K., Chang, J. & Jao, D. (2022). Optimal generic attack against basic Boneh-Boyen signatures. Information Security Practice and Experience, Lecture Notes in Computer Science (13620): pp. 505–519.en
uws.contributor.affiliation1Faculty of Mathematicsen
uws.contributor.affiliation2Combinatorics and Optimizationen
uws.typeOfResourceTexten
uws.peerReviewStatusRevieweden
uws.scholarLevelFacultyen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record


UWSpace

University of Waterloo Library
200 University Avenue West
Waterloo, Ontario, Canada N2L 3G1
519 888 4883

All items in UWSpace are protected by copyright, with all rights reserved.

DSpace software

Service outages