On security of a certificateless signcryption scheme

被引:41
作者
Miao, Songqin [1 ]
Zhang, Futai [1 ,2 ]
Li, Sujuan [1 ]
Mu, Yi [3 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[2] Jiangsu Engn Res Ctr Informat Secur & Privacy Pro, Nanjing, Jiangsu, Peoples R China
[3] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
关键词
Certificateless cryptography; Signcryption; Confidentiality; Non-repudiation; Public key replacement attack; SIGNATURE SCHEME; CRYPTOGRAPHY; ENCRYPTION;
D O I
10.1016/j.ins.2011.11.045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It would be interesting if a signcryption scheme in the standard model could be. made certificateless. One of the interesting attempts is due to Liu et al. [Z. Liu, Y. Hu, X. Zhang, H. Ma, Certificateless signcryption scheme in the standard model, Information Sciences 180 (3) (2010)452-464]. In this paper, we provide a cryptanalysis on this scheme by depicting two kinds Of subtle public key replacement attacks against it. Our analysis reveals that it does not meet the basic requirements of confidentiality and non-repudiation. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:475 / 481
页数:7
相关论文
共 33 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
[3]  
[Anonymous], P CRYPT 1984
[4]  
Aranha D., EFFICIENT CERTIFICAT
[5]  
Barbosa M., 2008, P 2008 ACM S INF COM, P369
[6]  
Barreto P., EFFICIENT CERTIFICAT
[7]  
Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
[8]   The random oracle methodology, revisited [J].
Canetti, R ;
Goldreich, O ;
Halevi, S .
JOURNAL OF THE ACM, 2004, 51 (04) :557-594
[9]   Certificateless Threshold Ring Signature [J].
Chang, Shuang ;
Wong, Duncan S. ;
Mu, Yi ;
Zhang, Zhenfeng .
INFORMATION SCIENCES, 2009, 179 (20) :3685-3696
[10]  
Chen LQ, 2005, LECT NOTES COMPUT SC, V3386, P362