Analysis and Improvement of Certificateless signature and Proxy re-signature schemes

被引:0
作者
Hu, Xiaoming [1 ]
Liu, Yan [1 ]
Xu, Huajie [2 ]
Wang, Jian [1 ]
Zhang, Xiaojun [3 ]
机构
[1] Shanghai Second Polytech Univ, Coll Comp & Informat Engn, Shanghai 201209, Peoples R China
[2] Guangxi Univ, Sch Comp & Elect Informat, Nanning 530004, Peoples R China
[3] Hebei Normal Univ Sci & Technol, E&A Coll, Qinhuangdao 066004, Hebei, Peoples R China
来源
2015 IEEE ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC) | 2015年
关键词
information security; certificateless signature; aggregate signature; proxy re-signature; security analysis; AGGREGATE SIGNATURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless cryptography avoids the key escrow problem in identity-based crytosystems and certificate management in traditional public-key crytosystems, it has been researched by many scholars and many certificateless signature schemes have been proposed. However, most of them exist some security drawbacks and are insecure for some kinds of attacks. In this paper, we analyze two certificateless signature schemes and one proxy re-signature scheme proposed by some scholars recently. And we show that these schemes are insecure and also present the detailed attack steps. In order to overcome this problem, we also address some improved schemes which have the same or better performance than the original schemes.
引用
收藏
页码:166 / 170
页数:5
相关论文
共 15 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
Chen M, 2015, APPL RES COMPUTERS, V33, P1
[3]  
[杜红珍 Du Hongzhen], 2013, [电子学报, Acta Electronica Sinica], V41, P72
[4]  
Feng Jie, 2014, Journal of Computer Applications, V34, P3291, DOI 10.11772/j.issn.1001-9081.2014.11.3291
[5]  
Gu K., 2013, COMPUT J, V11, P1
[6]  
Huang Ping, 2015, Journal of Computer Applications, V35, P1678, DOI 10.11772/j.issn.1001-9081.2015.06.1678
[7]   A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings [J].
Islam, S. K. Hafizul ;
Biswas, G. P. .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2014, 26 (01) :55-67
[8]   Cryptanalysis of a certificateless aggregate signature scheme for mobile computation [J].
Khan, Muhammad Khurram ;
He, Debiao .
APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (04) :1383-1386
[9]  
Kim KS, 2013, J COMMUN NETW-S KOR, V15, P1, DOI [10.1109/JCN.2013.000003, 10.12812/ksms.2013.15.2.1]
[10]  
[路标 Lu Biao], 2015, [计算机应用与软件, Computer Applications and Software], V32, P323