Key Replacement Attack on Two Certificateless Signature Schemes without Random Oracles

被引:24
|
作者
Xia, Qi [1 ]
Xu, Chunxiang [1 ]
Yu, Yong [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
来源
ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2 | 2010年 / 439-440卷
关键词
Cryptography; Certificateless signature; Key replacement attack; GENERIC CONSTRUCTION; SECURITY;
D O I
10.4028/www.scientific.net/KEM.439-440.1606
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Liu et al. proposed the first certificateless signature scheme without random oracles in 2007. However, Xiong et al. showed that Liu et al.'s scheme is insecure against a malicious-but-passive KGC attack and proposed an improved scheme. In ISA 2009, Yuan et al. also proposed a new certificateless signature scheme without random oracles. Although they claimed that the two schemes are secure in the standard model, this paper shows that both Xiong et al.'s improved scheme and Yuan et al.'s new scheme are vulnerable to key replacement attack, where an adversary, obtaining a signature on a message and replacing the public key of a signer, can forge valid signatures on the same message under the replaced public key. We also give the corresponding modifications of the two schemes to resist key replacement attack.
引用
收藏
页码:1606 / 1611
页数:6
相关论文
共 50 条
  • [41] Attack on an Efficient Certificateless Aggregate Signature without Pairing
    LI Huimin
    LIANG Hongmei
    WANG Haimin
    ZHANG Jinhui
    WuhanUniversityJournalofNaturalSciences, 2020, 25 (02) : 139 - 145
  • [42] Identity-based key-insulated proxy signature without random oracles
    Chen J.-H.
    Long Y.
    Chen K.-F.
    Wang Y.-T.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (05) : 557 - 566
  • [43] Identity-based parallel key-insulated signature without random oracles
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    不详
    不详
    J. Inf. Sci. Eng., 2008, 4 (1143-1157):
  • [44] Identity-based threshold key-insulated signature without random oracles
    Chen, Jian-Hong
    Shan, Jing-Song
    Yang, Rong-Gen
    Gong, Le-Jun
    Chen, Ke-Fei
    Yu, Kun
    Chen, Li-Qing
    Sun, Cheng-Fu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2013, 47 (08): : 1239 - 1245
  • [45] Identity-based parallel key-insulated signature without random oracles
    Weng, Jian
    Li, Xiang-Xue
    Chen, Ke-Fei
    Liu, Sheng-Li
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2008, 24 (04) : 1143 - 1157
  • [46] Identity-Based Key-Insulated Proxy Signature Without Random Oracles
    陈剑洪
    龙宇
    陈克非
    王永涛
    Journal of Shanghai Jiaotong University(Science), 2011, 16 (05) : 557 - 566
  • [47] Identity-Based strong key-insulated signature without random oracles
    Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    不详
    不详
    Ruan Jian Xue Bao, 2008, 6 (1555-1564):
  • [48] Certificateless Public Key Signature Schemes from Standard Algorithms
    Cheng, Zhaohui
    Chen, Liqun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 179 - 197
  • [49] Verifiably encrypted signature scheme without random oracles
    Gorantla, MC
    Saxena, A
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 357 - 363
  • [50] Multi-proxy signature without random oracles
    Yu Yong
    Sun Ying
    Yang Bog
    Xu Chunxiang
    Liu Shuanggen
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (03): : 475 - 480