Cryptanalysis and improvement of an efficient certificateless signature scheme

被引:31
作者
Li, Jiguo [1 ]
Huang, Xinyi [2 ]
Mu, Yi [2 ]
Wu, Wei [2 ]
机构
[1] Hohai Univ, Coll Comp & Informat Engn, Nanjing, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW, Australia
关键词
certificateless; cryptography; certificateless signature; public key replacement attack; security analysis;
D O I
10.1109/JCN.2008.6388323
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced. The advantage of certificateless public key cryptography successfully eliminates the necessity of certificates in the traditional public key cryptography and simultaneously solves the inherent key escrow problem suffered in identity-based cryptography. Recently, Yap et al. proposed an efficient certificateless; signature scheme and claimed that their scheme is existentially unforgeable in the random oracle model. In this paper, we show that the certificateless signature scheme proposed by Yap et al. is insecure against public key replacement attacks. Furthermore, we propose an improved certificateless; signature scheme, which is existentially unforgeable against adaptive chosen message attacks under the computational Diffie-Hellman assumption in the random oracle model and provide the security proof of the proposed scheme.
引用
收藏
页码:10 / 17
页数:8
相关论文
共 50 条
[31]   An efficient certificateless signature scheme without bilinear pairings [J].
Yeh, Kuo-Hui ;
Tsai, Kuo-Yu ;
Fan, Chuan-Yen .
MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (16) :6519-6530
[32]   An efficient certificateless signature scheme without bilinear pairings [J].
Kuo-Hui Yeh ;
Kuo-Yu Tsai ;
Chuan-Yen Fan .
Multimedia Tools and Applications, 2015, 74 :6519-6530
[33]   Efficient ID-based certificateless signature scheme [J].
Key Laboratory of Computer Network and Information Security, Xidian University, Xi'an 710071, China .
Tongxin Xuebao, 2008, 2 (87-94)
[34]   Cryptanalysis and Improvement of Piveteau Signature Scheme with Message Recovery [J].
李子臣 ;
成军祥 ;
戴一奇 .
TsinghuaScienceandTechnology, 2003, (02) :198-200
[35]   Cryptanalysis and Improvements of Two Certificateless Signature Schemes with Additional Properties [J].
Nong, Qiang ;
Hao, Yanhua .
ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, :54-58
[36]   The Analysis and Improvement of A Certificateless Threshold Proxy Blind Signature Scheme [J].
Liu, Er-Gen ;
Zhou, Hua-Jing ;
Zuo, Li-Ming ;
Wang, Xia .
INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, :494-501
[37]   An Efficient and Secure RSA Based Certificateless Signature Scheme for Wireless Sensor Networks [J].
Singh, Jitendra ;
Kumar, Vimal ;
Kumar, Rakesh .
ADVANCES IN SIGNAL PROCESSING AND INTELLIGENT RECOGNITION SYSTEMS (SIRS-2015), 2016, 425 :685-697
[38]   Blockchain-enhanced efficient and anonymous certificateless signature scheme and its application [J].
Feng, Tao ;
Wang, Jie ;
Zheng, Lu .
PERVASIVE AND MOBILE COMPUTING, 2024, 105
[39]   A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings [J].
Wang, Liangliang ;
Chen, Kefei ;
Long, Yu ;
Mao, Xianping ;
Wang, Huige .
2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, :82-85
[40]   Certificateless undeniable signature scheme [J].
Duan, Shanshan .
INFORMATION SCIENCES, 2008, 178 (03) :742-755