On the security of two signature schemes for secure communication in IoT environments

被引:0
|
作者
Xu, Feihong [1 ]
Zeng, Hui [2 ]
机构
[1] Wuchang Univ Technol, Sch Artificial Intelligence, Wuhan, Peoples R China
[2] Hubei Open Univ, Sch Software Engn, Wuhan, Peoples R China
关键词
Pairing; Certificateless signature; Aggregate signature; IoT; CERTIFICATELESS AGGREGATE SIGNATURE; EFFICIENT;
D O I
10.1007/s11042-023-17312-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Thumbur et al. (IEEE Commun Lett 24(8): 1641-1645, 2020) proposed a pairing-free certificateless signature (PF-CLS) scheme for secure communication in resource-constrained devices. Zhan et al. (IEEE Internet of Things Journal, pp 1-1, 2020) proposed a pairing-free certificateless aggregate signature (PF-CLAS) in healthcare wireless medical sensor networks. The authors proved the security of their schemes under the hardness of mathematical problems in the random oracle model respectively. Unfortunately, we find that the above two recent schemes are insecure. By providing concrete attacks, in this work, we show that an attacker with replacing public key ability can easily impersonate other legitimate users to upload some false messages by forging the target users' valid signatures on these messages. As a result, the above two signature schemes PF-CLS and PF-CLAS cannot solve the IoT data authenticity and integrity issues pointed out by them. Moreover, we discuss the reasons for our attacks and provide relevant improvements.
引用
收藏
页码:43673 / 43683
页数:11
相关论文
共 50 条
  • [41] Security analysis of some threshold signature schemes and multi-signature schemes
    Cao, TJ
    Lin, DD
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 233 - 241
  • [42] A Secure and Efficient Signature Scheme for IoT in Healthcare
    Kakkar, Latika
    Gupta, Deepali
    Tanwar, Sarvesh
    Saxena, Sapna
    Alsubhi, Khalid
    Anand, Divya
    Noya, Irene Delgado
    Goyal, Nitin
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (03): : 6151 - 6168
  • [43] Group signature schemes with forward secure properties
    Chen, L
    Huang, XQ
    You, JY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 841 - 849
  • [44] Secure signature schemes based on interactive protocols
    Cramer, R
    Damgard, I
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 297 - 310
  • [45] Provable security of proxy signature schemes
    Gu, CX
    Zhu, YF
    [J]. ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1059 - 1063
  • [46] Boosting the Security of Blind Signature Schemes
    Katz, Jonathan
    Loss, Julian
    Rosenberg, Michael
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT IV, 2021, 13093 : 468 - 492
  • [47] A provably secure certificateless organizational signature schemes
    Allam, Ali M.
    Ali, Ihab A.
    Mahgoub, Shereen M.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (05)
  • [48] The security of the birational permutation signature schemes
    Coppersmith, D
    Stern, J
    Vaudenay, S
    [J]. JOURNAL OF CRYPTOLOGY, 1997, 10 (03) : 207 - 221
  • [49] THE SECURITY OF HE AND KIESLERS SIGNATURE SCHEMES
    LEE, NY
    HWANG, T
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 370 - 372
  • [50] A Survey on Security of Certificateless Signature Schemes
    Chen, Yu-Chi
    Tso, Raylin
    [J]. IETE TECHNICAL REVIEW, 2016, 33 (02) : 115 - 121