On the Security of a Certificateless Signature Scheme

Article Preview

Abstract:

Certificateless public key cryptography eliminates inherent key escrow problem in identity-based cryptography, and does not yet requires certificates as in the traditional public key infrastructure. Recently, Yu et al. propose a new certificateless signature scheme and their scheme offers shorter system parameters and higher computational efficiency than the previous schemes in the standard model. However, in this paper, we show Yu et al.'s certificateless signature scheme is vulnerable to malicious-but-passive KGC attack where a malicious KGC can forge valid signatures by embedding extra trapdoors in the system parameter.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

965-968

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] A. Shamir, in: Advances in Cryptology-Crypto 1984, LNCS, vol. 196, Springer, 1984, p.47–53.

Google Scholar

[2] S. Al-Riyami and K. Paterson, in: Advances in Cryptology-ASIACRYPT 2003, LNCS, vol. 2894, Springer, 2003, p.452–473.

DOI: 10.1007/978-3-540-40061-5_29

Google Scholar

[3] M.H. Au, Y. Mu, J. Chen, D.S. Wong, J.K. Liu, and G. Yang, in: Proceedings of the 2nd ACM symposium on Information, computer and communications, ACM, 2007, p.302–311.

Google Scholar

[4] A. Dent, B. Libert, K. Paterson, in: Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography, Springer, p.344–359.

DOI: 10.1007/978-3-540-78440-1_20

Google Scholar

[5] X. Li, K. Chen, L. Sun: Lithuanian Mathematical Journal 45: 76–83, (2005).

Google Scholar

[6] J.K. Liu, M.H. Au, and W. Susilo, in: Proceedings of the 2nd ACM symposium on Information, computer and communications security, ACM, 2007, p.273–283.

Google Scholar

[7] H. Xiong, Z. Qin, and F. Li: Fundamenta Informaticae, 88: 193–206, (2008).

Google Scholar

[8] Y. Yu, Y. Mu, G. Wang, Q. Xia, and B. Yang: IET Information Security, 6: 102–110, (2012).

Google Scholar

[9] Y. Yuan, D. Li, L. Tian, and Zhu H, in: ISA 2009, LNCS, vol. 5576, Springer, 2009, p.31–40.

Google Scholar