Cryptanalysis and improvement of a certificateless partially blind signature

被引:6
|
作者
Cheng, Lin [1 ,2 ]
Wen, Qiaoyan [2 ]
机构
[1] China Informat Technol Secur Evaluat Ctr, Tech Assessment Res Lab, Beijing 100085, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switch Technol, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
electronic money; digital signatures; public key cryptography; cryptanalysis; certificateless partially blind signature scheme; secure electronic cash system; CLPBS scheme; security weakness; formal security proof; rescued scheme; signer public key; e-cash system; electronic coins; AGGREGATE SIGNATURE; SCHEME; SECURE;
D O I
10.1049/iet-ifs.2014.0293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Partially blind signature is an important technique in secure electronic cash (e-cash) system. The first concrete certificateless partially blind signature (CLPBS) scheme for e-cash was constructed in 2011. Recently it was found that this construction had a security weakness and a rescued scheme was given. Unfortunately, the formal security proof was not given. In this study, the authors first give cryptanalysis of their rescued scheme. They demonstrate that a malicious user in their rescued scheme can forge a signature on any message by replacing the signer's public key. In an e-cash system, blind signatures issued by the bank are viewed as e-cash. Once they apply their scheme to an untraceable e-cash system, a malicious user can forge valid electronic coins (i.e. valid signatures) without being detected by the bank. It will result in loss of the bank. Then, they propose a newly improved CLPBS scheme which achieves the strongest security level and has higher computational efficiency than the rescued scheme published earlier. Finally, they give an example of potential application to e-cash systems using their scheme.
引用
收藏
页码:380 / 386
页数:7
相关论文
共 50 条
  • [21] Cryptanalysis and Improvement of a New Certificateless Signature Scheme in the Standard Model
    Wu, Chenhuang
    Huang, Hui
    Zhou, Kun
    Xu, Chunxiang
    CHINA COMMUNICATIONS, 2021, 18 (01) : 151 - 160
  • [22] Cryptanalysis and Improvement of a Certificateless Short Signature Scheme using Bilinear Pairing
    Karati, Arijit
    Biswas, G. P.
    INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016, 2016,
  • [23] Cryptanalysis and Improvement of a Blockchain-Based Certificateless Signature for IIoT Devices
    Yang, Xiaodong
    Wang, Wenjia
    Tian, Tian
    Wang, Caifen
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (02) : 1884 - 1894
  • [24] Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings
    Lu, Rongbo
    He, Dake
    Wang, Changji
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 285 - +
  • [25] Cryptanalysis of a Certificateless Aggregate Signature Scheme
    Kumar, Pankaj
    Sharma, Vishnu
    Sharma, Gaurav
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1095 - 1098
  • [26] Cryptanalysis of a certificateless aggregate signature scheme
    Wang, Liangliang
    Chen, Kefei
    Long, Yu
    Wang, Huige
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1353 - 1358
  • [27] Cryptanalysis on Two Certificateless Signature Schemes
    Zhang, F.
    Li, S.
    Miao, S.
    Mu, Y.
    Susilo, W.
    Huang, X.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2010, 5 (04) : 586 - 591
  • [28] certificateless partially-blind signature scheme with provable security
    Zhao Z.-G.
    1600, Univ. of Electronic Science and Technology of China (45): : 812 - 818
  • [29] CERTIFICATELESS SIGNATURE AND BLIND SIGNATURE
    Zhang Lei Zhang Futai(College of Mathematics and Computer Science
    Journal of Electronics(China), 2008, (05) : 629 - 635
  • [30] Cryptanalysis of Huang-Chang partially blind signature scheme
    Zhang, FG
    Chen, XF
    JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 76 (03) : 323 - 325