<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">0868-4952</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<publisher>
				<publisher-name>VU</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">inf18304</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2007.183</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes<xref ref-type="fn" rid="fn1">
						<sup>✩</sup>
					</xref>
				</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="Author">
					<name>
						<surname>Huang</surname>
						<given-names>Zhenjie</given-names>
					</name>
					<email xlink:href="mailto:zjhuang@fjzs.edu.cn">zjhuang@fjzs.edu.cn</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_001"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Chen</surname>
						<given-names>Kefei</given-names>
					</name>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_001"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Lin</surname>
						<given-names>Xuanzhi</given-names>
					</name>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Huang</surname>
						<given-names>Rufen</given-names>
					</name>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<aff id="j_INFORMATICA_aff_000">Department of Computer Science and Engineering, Zhangzhou Normal University, Fujian, 363000, P. R. China</aff>
				<aff id="j_INFORMATICA_aff_001">Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200030, P. R. China</aff>
			</contrib-group>
			<author-notes>
				<fn id="fn1">
					<label>
						<sup>✩</sup>
					</label><p>This work is supported by the National Natural Science Foundation of China under Grant No.60673078, the China Postdoctoral Science Foundation under Grant No. 20060390152, the Natural Science Foundation of Fujian Province of China under Grant No.2006J0045 and the Innovation Foundation for Young Technological Talents of Fujian Province of China under Grant No.2005J055.</p>
				</fn>
			</author-notes>
			<pub-date pub-type="epub">
				<day>01</day>
				<month>01</month>
				<year>2007</year>
			</pub-date>
			<volume>18</volume>
			<issue>3</issue>
			<fpage>375</fpage>
			<lpage>394</lpage>
			<history>
				<date date-type="received">
					<day>01</day>
					<month>01</month>
					<year>2007</year>
				</date>
			</history>
			<abstract>
				<p>The notion of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004. In concurrent signature schemes, two entities can produce two signatures that are not binding, until an extra piece of information (namely the keystone) is released by one of the parties. Upon release of the keystone, both signatures become binding to their true signers concurrently. In ICICS 2005, two identity-based perfect concurrent signature schemes were proposed by Chow and Susilo. In this paper, we show that these two schemes are unfair. In which the initial signer can cheat the matching signer. We present a formal definition of ID-based concurrent signatures which redress the flaw of Chow et al.'s definition and then propose two simple but significant improvements to fix our attacks.</p>
			</abstract>
			<kwd-group>
				<label>Keywords</label>
				<kwd>concurrent signature</kwd>
				<kwd>identity-based</kwd>
				<kwd>bilinear pairings</kwd>
				<kwd>cryptoanalysis</kwd>
				<kwd>fair exchange</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>