2005
DOI: 10.1007/11599371_2
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of Certificateless Signature Schemes from Asiacrypt 2003

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
156
0
11

Year Published

2006
2006
2018
2018

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 208 publications
(172 citation statements)
references
References 12 publications
0
156
0
11
Order By: Relevance
“…They also provide a key agreement protocol, and a hierarchical encryption scheme in the same model, although none of these extras comes with a formal security analysis. The signature scheme they proposed is later found to be insecure by [14]. More efficient constructions of certificateless public key encryption were proposed subsequently [1,3,9,18].…”
Section: Sem Predefined Instant Escrow Implicit Freementioning
confidence: 99%
“…They also provide a key agreement protocol, and a hierarchical encryption scheme in the same model, although none of these extras comes with a formal security analysis. The signature scheme they proposed is later found to be insecure by [14]. More efficient constructions of certificateless public key encryption were proposed subsequently [1,3,9,18].…”
Section: Sem Predefined Instant Escrow Implicit Freementioning
confidence: 99%
“…Besides [1,9], it was shown that certificateless signature schemes in [12] and [13] are insecure against the malicious-but-passive KGC attack [8]. Additionally, the certificateless designated verifier signature scheme proposed by Huang et al is vulnerable to the malicious-but-passive KGC attack as they follow the same system parameters and user key generation procedure as that of [1].…”
Section: Malicious-but-passive Kgc Attackmentioning
confidence: 99%
“…A mediated certificateless signature scheme uses an online semitrusted entity called the Security Mediator(SEM) for easy revocation of the user signing key. Since a key replacement attack is not related to the partial private key generated by the KGC (and shared by the user and the SEM), the attack in [9] is applied to the Ju et al's scheme directly. Similarly, a malicious-butpassive KGC attack in [2] also works because the SEM does not participate in the system parameters generation phase.…”
Section: Malicious-but-passive Kgc Attackmentioning
confidence: 99%
See 2 more Smart Citations