On the security of two signature schemes for secure communication in IoT environments

被引:0
|
作者
Xu, Feihong [1 ]
Zeng, Hui [2 ]
机构
[1] Wuchang Univ Technol, Sch Artificial Intelligence, Wuhan, Peoples R China
[2] Hubei Open Univ, Sch Software Engn, Wuhan, Peoples R China
关键词
Pairing; Certificateless signature; Aggregate signature; IoT; CERTIFICATELESS AGGREGATE SIGNATURE; EFFICIENT;
D O I
10.1007/s11042-023-17312-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Thumbur et al. (IEEE Commun Lett 24(8): 1641-1645, 2020) proposed a pairing-free certificateless signature (PF-CLS) scheme for secure communication in resource-constrained devices. Zhan et al. (IEEE Internet of Things Journal, pp 1-1, 2020) proposed a pairing-free certificateless aggregate signature (PF-CLAS) in healthcare wireless medical sensor networks. The authors proved the security of their schemes under the hardness of mathematical problems in the random oracle model respectively. Unfortunately, we find that the above two recent schemes are insecure. By providing concrete attacks, in this work, we show that an attacker with replacing public key ability can easily impersonate other legitimate users to upload some false messages by forging the target users' valid signatures on these messages. As a result, the above two signature schemes PF-CLS and PF-CLAS cannot solve the IoT data authenticity and integrity issues pointed out by them. Moreover, we discuss the reasons for our attacks and provide relevant improvements.
引用
收藏
页码:43673 / 43683
页数:11
相关论文
共 50 条
  • [31] On the Security of Certificateless Signature Schemes
    Sharma, Gaurav
    Bala, Suman
    Verma, Anil K.
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [32] Unconditionally Secure Signature Schemes Revisited
    Swanson, Colleen M.
    Stinson, Douglas R.
    [J]. INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 100 - 116
  • [33] Security proofs for signature schemes
    Pointcheval, D
    Stern, J
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 387 - 398
  • [34] Unconditionally secure signature schemes revisited
    Swanson, Colleen M.
    Stinson, Douglas R.
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2016, 10 (01) : 35 - 67
  • [35] Two modified nominative proxy signature schemes for mobile communication
    Zhang, JH
    Zou, JC
    Wang, YM
    [J]. 2005 IEEE Networking, Sensing and Control Proceedings, 2005, : 1054 - 1057
  • [36] On the security of two identity-based signature schemes based on pairings
    Qin, Zhen
    Yuan, Chen
    Wang, Yilei
    Xiong, Hu
    [J]. INFORMATION PROCESSING LETTERS, 2016, 116 (06) : 416 - 418
  • [37] Cryptanalysis and improvement of two ring signature schemes provably secure in standard model
    Wang, Hua-Qun
    Yu, Hong
    Lv, Xian-Qiang
    Zhang, Fu-Tai
    Sun, Yan-Fei
    [J]. Tongxin Xuebao/Journal on Communications, 2008, 29 (08): : 57 - 62
  • [38] The performance analysis of two digital signature schemes based on secure charging protocol
    Rao, WB
    Gan, Q
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1180 - 1182
  • [39] Blockchain-based group signature for secure authentication of IoT systems in smart home environments
    Kara M.
    Merzeh H.R.J.
    Aydin M.A.
    Balik H.H.
    [J]. Cyber-Physical Systems, 2024, 10 (04) : 362 - 386
  • [40] Deeper Insight Into Why Authentication Schemes in IoT Environments Fail to Achieve the Desired Security
    Guo, Yimin
    Guo, Yajun
    Xiong, Ping
    Yang, Fan
    Zhang, Chengde
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4615 - 4627