Security analysis of two certificateless short signature schemes

被引:4
|
作者
Du, Hongzhen [1 ]
Wen, Qiaoyan [2 ]
机构
[1] Baoji Univ Arts & Sci, Dept Math, Baoji 721013, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Sci, Beijing 100876, Peoples R China
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
GENERIC CONSTRUCTION; EFFICIENT; MODEL;
D O I
10.1049/iet-ifs.2013.0080
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless public key cryptography (CL-PKC) combines the advantage of both traditional PKC and identity-based cryptography (IBC) as it eliminates the certificate management problem in traditional PKC and resolves the key escrow problem in IBC. Recently, Choi et al. and Tso et al. proposed two different efficient CL short signature schemes and claimed that the two schemes are secure against super adversaries and satisfy the strongest security. In this study, the authors show that both Choi et al.'s scheme and Tso et al.'s scheme are insecure against the strong adversaries who can replace users' public keys and have access to the signing oracle under the replaced public keys.
引用
收藏
页码:230 / 233
页数:4
相关论文
共 50 条
  • [1] On the Security of Certificateless Signature Schemes
    Sharma, Gaurav
    Bala, Suman
    Verma, Anil K.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [2] Security analysis and improvements of certificateless aggregate signature schemes
    Zhang, Yu-Lei
    Li, Chen-Yi
    Wang, Cai-Fen
    Zhang, Yong-Jie
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2015, 37 (08): : 1994 - 1999
  • [3] A Survey on Security of Certificateless Signature Schemes
    Chen, Yu-Chi
    Tso, Raylin
    IETE TECHNICAL REVIEW, 2016, 33 (02) : 115 - 121
  • [4] Security Model for Certificateless Aggregate Signature Schemes
    Zhang, Lei
    Zhang, Futai
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 925 - 929
  • [5] Notes on the security of certificateless aggregate signature schemes
    Zhang, Futai
    Shen, Limin
    Wu, Ge
    INFORMATION SCIENCES, 2014, 287 : 32 - 37
  • [6] Security models for certificateless signature schemes revisited
    Shim, Kyung-Ah
    INFORMATION SCIENCES, 2015, 296 : 315 - 321
  • [7] Certificateless Aggregate Signature Schemes with Improved Security
    Nguyen Quoc Viet
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 92 - 99
  • [8] On the Security of a Certificateless Short Signature Scheme
    Behnia, Rouzbeh
    Heng, Swee-Huay
    Tan, Syh-Yuan
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2015, 9 : 103 - 113
  • [9] Cryptanalysis on Two Certificateless Signature Schemes
    Zhang, F.
    Li, S.
    Miao, S.
    Mu, Y.
    Susilo, W.
    Huang, X.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2010, 5 (04) : 586 - 591
  • [10] On the security of certificateless signature schemes from Asiacrypt 2003
    Huang, XY
    Susilo, W
    Mu, Y
    Zhang, FT
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 13 - 25