2016
DOI: 10.1016/j.ins.2016.08.082
|View full text |Cite
|
Sign up to set email alerts
|

A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 46 publications
0
8
0
Order By: Relevance
“…In practice, a CA possibly is untrusted and malicious. As shown in [27,35], it is very likely to compromise a target's message privacy or signature unforgeability without the knowledge of the corresponding secret key by injecting some malicious trapdoors into the system. In this paper, we demonstrate that Li et al's FS-CBS scheme [38] is insecure under the existential forgery attack from the malicious CA.…”
Section: Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…In practice, a CA possibly is untrusted and malicious. As shown in [27,35], it is very likely to compromise a target's message privacy or signature unforgeability without the knowledge of the corresponding secret key by injecting some malicious trapdoors into the system. In this paper, we demonstrate that Li et al's FS-CBS scheme [38] is insecure under the existential forgery attack from the malicious CA.…”
Section: Contributionsmentioning
confidence: 99%
“…In addition, CBC also addresses the key escrow and distribution problems. In recent years, CBC has attracted much attention in academic circle and a lot of cryptographic schemes [19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36] (includeing many certificate-based encryption (CBE) and certificate-based signature (CBS) schemes) have been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…It is worth mentioning that the user must employ both her/his private key and certificate to decrypt a ciphertext and sign a message. In the past, based on the certificate-based public-key settings, numerous cryptographic primitives have been proposed, such as certificatebased encryption [9], [10] and certificate-based signature [11], [12].…”
Section: Introductionmentioning
confidence: 99%
“…Since its invention, CBC has obsorbed great interest from the cryptography community and numerous CBC schemes have been published, including certificate-based encryption (e.g. [9,28,31,32,39,46]), certificate-based signature (e.g. [2,18,21,22,27,30]) and certificate-based signcryption (e.g.…”
Section: Introductionmentioning
confidence: 99%