Paper Title:
Key Replacement Attack on Two Certificateless Signature Schemes without Random Oracles
  Abstract

Liu et al. proposed the first certificateless signature scheme without random oracles in 2007. However, Xiong et al. showed that Liu et al.'s scheme is insecure against a malicious-but-passive KGC attack and proposed an improved scheme. In ISA 2009, Yuan et al. also proposed a new certificateless signature scheme without random oracles. Although they claimed that the two schemes are secure in the standard model, this paper shows that both Xiong et al.'s improved scheme and Yuan et al.'s new scheme are vulnerable to key replacement attack, where an adversary, obtaining a signature on a message and replacing the public key of a signer, can forge valid signatures on the same message under the replaced public key. We also give the corresponding modifications of the two schemes to resist key replacement attack.

  Info
Periodical
Key Engineering Materials (Volumes 439-440)
Edited by
Yanwen Wu
Pages
1606-1611
DOI
10.4028/www.scientific.net/KEM.439-440.1606
Citation
Q. Xia, C. X. Xu, Y. Yu, "Key Replacement Attack on Two Certificateless Signature Schemes without Random Oracles", Key Engineering Materials, Vols. 439-440, pp. 1606-1611, 2010
Online since
June 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Xuan Wu Zhou
Abstract:System optimization for key management is an essential method to facilitate the wide application of key management in cryptography protocols....
539
Authors: Jian Hong Zhang, Hua Chen, Yi Xian Yang
Abstract:Traditional public key cryptosystem (PKC) requires high maintenance cost for certificate management. Although, identity based cryptosystem...
1271
Authors: Fan Yu Kong, Jia Yu
Abstract:At IWSEC 2008, F. Guo et al. proposed an efficient short signature scheme with batch verification based on C. Gentry’s scheme. In this...
1605
Authors: Fan Yu Kong, Lei Wu, Jia Yu
Abstract:In 2009, R. Tso et al. proposed an efficient pairing-based short signature scheme which is provably secure in the Random Oracle Model. In...
785
Authors: Shao Ping Yin
Abstract:In order to reap the benefits promised by the Smart Grid, communications between the IEDs in IEC 61850 Substation Automation System (SAS)...
2805