Security analysis of two signature schemes and their improved schemes

被引:0
|
作者
Zhang, Jianhong [1 ,2 ]
Mao, Jane [2 ]
机构
[1] North China Univ Technol, Coll Sci, Beijing 100041, Peoples R China
[2] Peking Univ, Inst Comp & Technol, Beijing 100871, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unforgeabilty is a primitive property of a secure digital signature. As two extensions of digital signature, signcryption and certificateles signature play an important role in the sensitive transmission. In this work, we analyze the security of two signature schemes, one is the certificateless signature scheme[17] which was proposed by Gorantla et al in CIS 2005, the other is an efficient short signcryption scheme[81 which was proposed by Ma et al in Inscrypto 2006. Then, we show that the two schemes were insecure. In Ma et al's scheme, if the recipient is dishonest, then he can produce any forgery on an arbitrary message and convince the trusted third party that the forgeable signcrytion comes from the signer. While, in Gorantla et al's scheme, any one can forge a signature on an arbitrary message in the name of the others. Finally, we give the corresponding improved scheme, respectively.
引用
收藏
页码:589 / +
页数:4
相关论文
共 50 条
  • [21] Security analysis of two signcryption schemes
    Wang, GL
    Deng, RH
    Kwak, D
    Moon, S
    INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 123 - 133
  • [22] Security analysis and improvements of arbitrated quantum signature schemes
    Zou, Xiangfu
    Qiu, Daowen
    PHYSICAL REVIEW A, 2010, 82 (04):
  • [23] Security analysis and improvements of certificateless aggregate signature schemes
    Zhang, Yu-Lei
    Li, Chen-Yi
    Wang, Cai-Fen
    Zhang, Yong-Jie
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2015, 37 (08): : 1994 - 1999
  • [24] Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes
    Shim, Kyung-Ah
    IEEE ACCESS, 2018, 6 : 68804 - 68812
  • [25] On the security of two signature schemes for secure communication in IoT environments
    Feihong Xu
    Hui Zeng
    Multimedia Tools and Applications, 2024, 83 : 43673 - 43683
  • [26] On the security of two signature schemes for secure communication in IoT environments
    Xu, Feihong
    Zeng, Hui
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (15) : 43673 - 43683
  • [27] On the security of two server-aided verification signature schemes
    Wu, H. (daisylilac@126.com), 2013, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [28] On the security of two signature schemes for secure communication in IoT environments
    Xu, Feihong
    Zeng, Hui
    Multimedia Tools and Applications, 83 (15): : 43673 - 43683
  • [29] Analysis and Attack of Two Ring Signature Schemes
    Wu, Lei
    AUTOMATION EQUIPMENT AND SYSTEMS, PTS 1-4, 2012, 468-471 : 382 - 385
  • [30] Provable security of proxy signature schemes
    Gu, CX
    Zhu, YF
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1059 - 1063