2014
DOI: 10.4028/www.scientific.net/amm.519-520.965
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of a Certificateless Signature Scheme

Abstract: Certificateless public key cryptography eliminates inherent key escrow problem in identity-based cryptography, and does not yet requires certificates as in the traditional public key infrastructure. Recently, Yu et al. propose a new certificateless signature scheme and their scheme offers shorter system parameters and higher computational efficiency than the previous schemes in the standard model. However, in this paper, we show Yu et al.'s certificateless signature scheme is vulnerable to malicious-but-passiv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…From the method, our scheme can resist the attack of Xiong et al [20]. Second, we embed part of public key into the signature, which is a good method to withstand the attack of malicious-but-passive KGC proposed by Cheng et al [24]. Finally, our scheme bind the signer's public key to his PSK and identity ID which can promote our scheme from trust level 2 to level 3 by the definition of Girault [25].…”
Section: Security Proofmentioning
confidence: 99%
See 1 more Smart Citation
“…From the method, our scheme can resist the attack of Xiong et al [20]. Second, we embed part of public key into the signature, which is a good method to withstand the attack of malicious-but-passive KGC proposed by Cheng et al [24]. Finally, our scheme bind the signer's public key to his PSK and identity ID which can promote our scheme from trust level 2 to level 3 by the definition of Girault [25].…”
Section: Security Proofmentioning
confidence: 99%
“…But they put all the focus on the public-key-replace attack proposed by Xia et al [22]. And, it has been proved insecure under the attack by Cheng et al [24]. Besides, Yu et al [23] ignored that a KGC can embed trapdoor information into the system public parameters to create valid signature.…”
Section: Introductionmentioning
confidence: 99%