Security analysis of two certificateless short signature schemes

被引:4
|
作者
Du, Hongzhen [1 ]
Wen, Qiaoyan [2 ]
机构
[1] Baoji Univ Arts & Sci, Dept Math, Baoji 721013, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Sci, Beijing 100876, Peoples R China
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
GENERIC CONSTRUCTION; EFFICIENT; MODEL;
D O I
10.1049/iet-ifs.2013.0080
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless public key cryptography (CL-PKC) combines the advantage of both traditional PKC and identity-based cryptography (IBC) as it eliminates the certificate management problem in traditional PKC and resolves the key escrow problem in IBC. Recently, Choi et al. and Tso et al. proposed two different efficient CL short signature schemes and claimed that the two schemes are secure against super adversaries and satisfy the strongest security. In this study, the authors show that both Choi et al.'s scheme and Tso et al.'s scheme are insecure against the strong adversaries who can replace users' public keys and have access to the signing oracle under the replaced public keys.
引用
收藏
页码:230 / 233
页数:4
相关论文
共 50 条
  • [41] Analysis Of Shim’s Attacks Against Some Certificateless Signature Schemes
    Cao, Zhengjun
    Markowitch, Olivier
    International Journal of Network Security, 2021, 23 (03) : 545 - 548
  • [42] Key Replacement Attack on Two Certificateless Signature Schemes without Random Oracles
    Xia, Qi
    Xu, Chunxiang
    Yu, Yong
    ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 1606 - 1611
  • [43] Security analysis of some threshold signature schemes and multi-signature schemes
    Cao, TJ
    Lin, DD
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 233 - 241
  • [44] Practical certificateless short signature scheme
    Tian, Miaomiao
    Huang, Liusheng
    Yang, Wei
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (03) : 204 - 218
  • [45] New certificateless short signature scheme
    He, Debiao
    Huang, Baojun
    Chen, Jianhua
    IET INFORMATION SECURITY, 2013, 7 (02) : 113 - 117
  • [46] Breaking the short certificateless signature scheme
    Shim, Kyung-Ah
    INFORMATION SCIENCES, 2009, 179 (03) : 303 - 306
  • [47] Certificateless short proxy signature scheme
    Yuan, Y. (ymyuan@xmu.edu.cn), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [48] On the Linkability and Security Analysis of Two Schnorr-Type Blind Signature Schemes
    Zhang, Jianhong
    Chen, Hua
    Gao, Shengnan
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 286 - 291
  • [49] On the security of two threshold signature schemes with traceable signers
    Wang, GL
    Han, XX
    Zhu, B
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 111 - 122
  • [50] Study on Security Analysis and Efficient Imrovement of Certificateless Aggregate Signature Scheme
    Hu, Xiaoming
    Tan, Wenan
    Ma, Chuang
    Chen, Fangshu
    Yu, Chengcheng
    PROCEEDINGS OF 2020 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2020), 2020, : 343 - 346