Improved for certificate-based signature scheme

被引:0
|
作者
Department of Computer Science, Minnan Normal University, Zhangzhou [1 ]
Fujian
363000, China
机构
来源
Beijing Youdian Daxue Xuebao | / 3卷 / 48-52期
关键词
Electronic document identification systems - Authentication;
D O I
10.13190/j.jbupt.2014.03.010
中图分类号
学科分类号
摘要
A forgery attack on Yang bo et al.'s certificate-based signature scheme was presented. It is found that the honest-but-curious certificate authority could forge a valid signature in any message on behalf of any user by choosing random parameters without knowing the secret value of the user. Analysis describes that the reason of insecurity of the original scheme is that the commitment value R computed in the stage of certificate generation is not used as an input of the hash function in the stage of signature generation. An improved scheme was proposed by adding R to the hash function. The improved scheme is as efficient as the original scheme. It is provably secure under the intractability of discrete logarithm problem.
引用
收藏
相关论文
共 50 条
  • [31] A New Certificate-Based Proxy Blind Signature Scheme with Batch Verification
    Nong Qiang
    Wu Shunxiang
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 553 - 557
  • [32] An efficient and provable certificate-based proxy signature scheme for IIoT environment
    Verma, Girraj Kumar
    Singh, B. B.
    Kumar, Neeraj
    Obaidat, Mohammad S.
    He, Debiao
    Singh, Harendra
    INFORMATION SCIENCES, 2020, 518 : 142 - 156
  • [33] A Certificate-Based Signcryption Scheme
    Luo, Ming
    Wen, Yingyou
    Zhao, Hong
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 17 - 23
  • [34] Short and Efficient Certificate-Based Signature
    Liu, Joseph K.
    Bao, Feng
    Zhou, Jianying
    NETWORKING 2011 WORKSHOPS, 2011, 6827 : 167 - 178
  • [35] Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments
    Zhu, Fei
    Xu, Feihong
    Yang, Xu
    Yi, Xun
    Abuadbba, Alsharif
    INFORMATION PROCESSING LETTERS, 2022, 173
  • [36] Provably secure certificate-based proxy blind signature scheme from pairings
    Verma, Girraj Kumar
    Singh, B. B.
    Singh, Harendra
    INFORMATION SCIENCES, 2018, 468 : 1 - 13
  • [37] Efficient certificate-based aggregate signature scheme for vehicular ad hoc networks
    Chen, Jian-Neng
    Huang, Zhen-Jie
    Zhou, Yu-Ping
    Zou, Fu-Min
    Chen, Chien-Ming
    Wu, Jimmy Ming-Tai
    Wu, Tsu-Yang
    IET NETWORKS, 2020, 9 (06) : 290 - 297
  • [38] On the security of a certificate-based signcryption scheme
    Yuan, Y. (ymyuan@xmu.edu.cn), 1600, CESER Publications, Post Box No. 113, Roorkee, 247667, India (49):
  • [39] Korean certificate-based digital signature algorithm
    Lima, Chae Hoon
    Lee, Pil Joong
    Computers and Electrical Engineering, 1999, 25 (04): : 249 - 265
  • [40] The Korean certificate-based digital signature algorithm
    Lim, CH
    Lee, PJ
    COMPUTERS & ELECTRICAL ENGINEERING, 1999, 25 (04) : 249 - 265