Cryptanalysis of a certificateless signcryption scheme in the standard model

被引:46
作者
Weng, Jian [1 ,2 ,3 ]
Yao, Guoxiang [1 ]
Deng, Robert H. [4 ]
Chen, Min-Rong [5 ]
Li, Xiangxue [6 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Guangdong, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China
[4] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
[5] Shenzhen Univ, Coll Informat Engn, Shenzhen 518060, Peoples R China
[6] E China Normal Univ, Dept Comp Sci & Technol, Shanghai 200241, Peoples R China
基金
国家高技术研究发展计划(863计划); 美国国家科学基金会;
关键词
Certificateless signcryption; Malicious-but-passive KGC attack; Semantic security; Existential unforgeability; ENCRYPTION; SIGNATURE; SECURITY;
D O I
10.1016/j.ins.2010.09.037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless signcryption is a useful primitive which simultaneously provides the functionalities of certificateless encryption and certificateless signature. Recently, Liu et al. 1151 proposed a new certificateless signcryption scheme, and claimed that their scheme is provably secure without random oracles in a strengthened security model, where the malicious-but-passive KGC attack is considered. Unfortunately, by giving concrete attacks, we indicate that Liu et al. certificateless signcryption scheme is not secure in this strengthened security model. (C) 2010 Elsevier Inc. All rights reserved.
引用
收藏
页码:661 / 667
页数:7
相关论文
共 18 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [2] [Anonymous], ASIACCS 2007
  • [3] Baek J, 2005, LECT NOTES COMPUT SC, V3650, P134
  • [4] Barbosa M., 2008, P 2008 ACM S INF COM, P369
  • [5] BELLARE M, ACM C COMP COMM SEC, P62
  • [6] The random oracle methodology, revisited
    Canetti, R
    Goldreich, O
    Halevi, S
    [J]. JOURNAL OF THE ACM, 2004, 51 (04) : 557 - 594
  • [7] CANETTI R, STOC, P209
  • [8] Certificateless Threshold Ring Signature
    Chang, Shuang
    Wong, Duncan S.
    Mu, Yi
    Zhang, Zhenfeng
    [J]. INFORMATION SCIENCES, 2009, 179 (20) : 3685 - 3696
  • [9] Chow SSM, 2008, LECT NOTES COMPUT SC, V5229, P126, DOI 10.1007/978-3-540-85855-3_9
  • [10] Dent AW, 2008, LECT NOTES COMPUT SC, V4939, P344, DOI 10.1007/978-3-540-78440-1_20