2015 International Conference on Intelligent Networking and Collaborative Systems 2015
DOI: 10.1109/incos.2015.10
|View full text |Cite
|
Sign up to set email alerts
|

A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(19 citation statements)
references
References 7 publications
0
19
0
Order By: Relevance
“…We now revisit Wang et al’s certificateless signature scheme [ 28 ], and demonstrate that the scheme is insecure against a super type I adversary. Revisiting the scheme: In the Setup phase, KGC generates a group G of elliptic curve points with prime order n and determines a generator P of G , prior to randomly selecting a master secret key and computing the master public key .…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…We now revisit Wang et al’s certificateless signature scheme [ 28 ], and demonstrate that the scheme is insecure against a super type I adversary. Revisiting the scheme: In the Setup phase, KGC generates a group G of elliptic curve points with prime order n and determines a generator P of G , prior to randomly selecting a master secret key and computing the master public key .…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, designing certificateless signature schemeswithout bilinear pairings has been extensively studied due to its effectiveness in solving the key escrow problem in identity-based cryptography, and its potential for deployment in an environment comprising resource-limited mobile devices. In this section, we first present the state-of-the-art of certificateless signature before revealing a previously unknown weakness in a recent certificateless signature mechanism proposed by Wang et al [ 28 ]. We then present a comparative summary of our proposed scheme and relevant schemes.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The malicious-but-passive KGC adversary sets some trapdoors in the system parameters and the master secret key and then uses these trapdoors to launch malicious attacks to compromise the security of the CLS scheme. However, some existing CLS schemes [6][7][8] have been shown to be insecure against malicious-but-passive KGC attacks.…”
Section: Definition Of Certificateless Signaturementioning
confidence: 99%