Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes
نویسندگان
چکیده
YU-CHI CHEN, RAYLIN TSO, GOWBOA HORNG, CHUN-I FAN AND RUEI-HAU HSU Department of Computer Science and Engineering National Chung Hsing University Taichung, 402 Taiwan Department of Computer Science National Chengchi University Taipei, 116 Taiwan Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung, 804 Taiwan Department of Computer Science National Chiao Tung University Hsinchu, 300 Taiwan
منابع مشابه
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
Secure aggregate signature schemes have attracted more concern due to their wide application in resource constrained environment. Recently, Horng et al. [S. J. Horng et al., An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks, Information Sciences 317 (2015) 48-66] proposed an efficient certificateless aggregate signature with condi...
متن کاملCryptanalysis and Improvement of a Certificateless Multi-proxy Signature Scheme
Multi-proxy signature allows an original signer authorizing a proxy group as his proxy agent and only the cooperation of all proxy signers in the group can create a proxy signature on behalf of the original signer. Recently, Jin and Wen defined a formal model of certificateless multi-proxy signature and proposed a concrete scheme. They claimed that their scheme is provably secure in their secur...
متن کاملStrongly secure certificateless short signatures
Short certificateless signatures have come into limelight in recent years. On the one hand, the property of certificateless eliminates the certificate management problem in traditional PKI and the key-escrow problem in some ID-based signature schemes. On the other hand, due to the short signature length, short certificateless signatures can be applied to systems where signatures are typed in by...
متن کاملCertificateless Signature Revisited
In this paper we revisit the security models of certificateless signatures and propose two new constructions which are provably secure in the random oracle model. We divide the potential adversaries according to their attack power, and for the first time, three new kinds of adversaries are introduced into certificateless signatures. They are Normal Adversary, Strong Adversary and Super Adversar...
متن کاملCertificateless Signature with Strong Unforgeability in the Standard Model
Abstract. Certificateless public-key systems (CL-PKS) were introduced to simultaneously solve two critical problems in public-key systems. One is the key escrow problem in ID-based public-key systems and the other is to eliminate the presence of certificates in conventional public-key systems. In the last decade, several certificateless signature (CLS) schemes have been proposed in the random o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Inf. Sci. Eng.
دوره 31 شماره
صفحات -
تاریخ انتشار 2015