Cryptanalysis of some certificateless signature schemes in the standard model

被引:0
作者
Wu, Chenhuang [1 ,2 ]
Lin, Weidi [1 ]
Huang, Hui [3 ]
Chen, Zhixiong [1 ,2 ]
机构
[1] Putian Univ, Dept Math, Putian 351100, Peoples R China
[2] Chinese Acad Sci, Inst Software, Informat Secur, Beijing 100049, Peoples R China
[3] Zhangzhou Normal Univ, Dept Comp Sci & Engn, Zhangzhou 363000, Peoples R China
来源
INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS & STATISTICS | 2013年 / 36卷 / 06期
基金
中国国家自然科学基金;
关键词
Certificateless signature; public key replacement attack; cryptanalysis; standard model; without random oracle model;
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Certificateless Public Key Cryptography, which removes the necessity of certificate to ensure the authentication of the user's public key in the traditional Certificate-Based Public Key Cryptography and also overcomes the inherent key escrow problem in the Identity-Based Public Key Cryptography. So far, to the best of our knowledge, in the literature there are only five certificateless signature schemes without additional properties, whose security can be proved in the standard model. However, we show attacks to some of these five schemes and conclude that all of them are insecure. Particularly, we show two types of attack on a certificateless signature scheme in the standard model which is very recently proposed by Yu et al.. Finally, we leave how to design an efficient and provable secure certificateless signature scheme without additional properties in the standard model as an open problem.
引用
收藏
页码:16 / 25
页数:10
相关论文
共 23 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
Bellare M., 1993, P ACM CCS, V93, P62, DOI DOI 10.1145/168588.168596
[3]  
Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P209, DOI 10.1145/276698.276741
[4]   A new provably secure certificateless short signature scheme [J].
Choi, Kyu Young ;
Park, Jong Hwan ;
Lee, Dong Hoon .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 61 (07) :1760-1768
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]   PKI: It's not dead, just resting [J].
Gutmann, P .
COMPUTER, 2002, 35 (08) :41-+
[7]  
Huang XY, 2007, LECT NOTES COMPUT SC, V4586, P308
[8]  
Huang XY, 2006, 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, P15
[9]  
LIU J, 2007, ASIACCS 2007, P273
[10]   Mediated certificateless signature without random oracles [J].
Zheng M. ;
Zhang J. ;
Zhang Z. .
Journal of Networks, 2011, 6 (08) :1222-1229