Security analysis on "Strongly secure certificateless key-insulated signature secure in the standard model"

被引:2
作者
Wang, Feng [1 ,2 ]
Xu, Li [2 ]
Pan, Jeng-Shyang [3 ]
机构
[1] Fujian Univ Technol, Coll Math & Phys, Fuzhou 350118, Fujian, Peoples R China
[2] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Fujian, Peoples R China
[3] Fujian Univ Technol, Coll Informat Sci & Engn, Fuzhou 350118, Fujian, Peoples R China
来源
2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP) | 2015年
关键词
Certificateless signature; key-insulated signature; malicious-but-passive KGC attack;
D O I
10.1109/IIH-MSP.2015.55
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Certificateless signature eliminates the need of certificates in traditional public key signature and solves the inherent key escrow problem in identity-based signature. Therefore, it is an important secure requirement to solve key escrow problem in certificateless signature scheme, i.e., certificateless signature scheme should to resist the malicious but passive KGC attack. Key-insulated signature reduces the endangerment of private key leakage. Recently, Chen et al. propose a certificateless key-insulated signature scheme, and give the security proof in the standard model. In this paper, we give a security analysis of Chen et al.'s scheme. Our analysis reveals that Chen et al.'s scheme is vulnerable to the malicious-but-passive KGC attack.
引用
收藏
页码:195 / 198
页数:4
相关论文
共 12 条
[1]  
Abelson H., 1997, The risks of key recovery, key escrow, and trusted third-party encryption
[2]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[4]  
Au M. H., 2007, P 2 ACM S INF COMP C, P302
[5]   The random oracle methodology, revisited [J].
Canetti, R ;
Goldreich, O ;
Halevi, S .
JOURNAL OF THE ACM, 2004, 51 (04) :557-594
[6]   Strongly secure certificateless key-insulated signature secure in the standard model [J].
Chen, Yanan ;
Xu, Weixiang ;
Xiong, Hu .
ANNALS OF TELECOMMUNICATIONS, 2015, 70 (9-10) :395-405
[7]  
Cramer R, 1998, LECT NOTES COMPUT SC, V1462, P13, DOI 10.1007/BFb0055717
[8]  
Dodis Y., P PKC 2003, P130
[9]  
Gentry C, 2006, LECT NOTES COMPUT SC, V3958, P257
[10]  
Shamir A., 1985, CRYPTO 1984 SANT BAR, V196, P47, DOI [10.1007/3-540-39568-7_5, 10.1007/3-540-39568-75, DOI 10.1007/3-540-39568-75]