Key Replacement Attack on Two Certificateless Signature Schemes without Random Oracles

被引:24
|
作者
Xia, Qi [1 ]
Xu, Chunxiang [1 ]
Yu, Yong [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
来源
关键词
Cryptography; Certificateless signature; Key replacement attack; GENERIC CONSTRUCTION; SECURITY;
D O I
10.4028/www.scientific.net/KEM.439-440.1606
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Liu et al. proposed the first certificateless signature scheme without random oracles in 2007. However, Xiong et al. showed that Liu et al.'s scheme is insecure against a malicious-but-passive KGC attack and proposed an improved scheme. In ISA 2009, Yuan et al. also proposed a new certificateless signature scheme without random oracles. Although they claimed that the two schemes are secure in the standard model, this paper shows that both Xiong et al.'s improved scheme and Yuan et al.'s new scheme are vulnerable to key replacement attack, where an adversary, obtaining a signature on a message and replacing the public key of a signer, can forge valid signatures on the same message under the replaced public key. We also give the corresponding modifications of the two schemes to resist key replacement attack.
引用
收藏
页码:1606 / 1611
页数:6
相关论文
共 50 条
  • [31] Cryptanalysis on Two Certificateless Signature Schemes
    Zhang, F.
    Li, S.
    Miao, S.
    Mu, Y.
    Susilo, W.
    Huang, X.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2010, 5 (04) : 586 - 591
  • [32] Proxy signature without random oracles
    Huang, Xinyi
    Susilo, Willy
    Mu, Yi
    Wu, Wei
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 473 - +
  • [33] Certificateless public key encryption in the Selective-ID security model (Without random oracles)
    Park, Jong Hwan
    Choi, Kyu Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2007, 2007, 4575 : 60 - +
  • [34] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, ChangShe
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1253 - 1258
  • [35] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, Changshe
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 470 - +
  • [36] Simulatability and Security of Certificateless threshold signatures without random oracles
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 871 - 876
  • [37] Fine-grained forward-secure signature schemes without random oracles
    Camenisch, J
    Koprowski, M
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 175 - 188
  • [38] Designated Verifier Signature without Random Oracles
    Liao, Yongjian
    Jia, Chenjun
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 533 - 536
  • [39] Short group signature without random oracles
    Liang, Xiaohui
    Cao, Zhenfu
    Shao, Jun
    Lin, Huang
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 69 - 82
  • [40] A novel short signature without random oracles
    Qin, Bo
    Wu, Qianhong
    Susilo, Willy
    Mu, Yi
    Wang, Yumin
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (04): : 707 - 710