On the Security of a RSA-based Certificateless Signature Scheme

نویسندگان

  • Debiao He
  • Muhammad Khurram Khan
  • Shuhua Wu
چکیده

The certificatless cryptography has been studied widely since it could eliminate the need of certificates in the Public Key Infrastructure and solve the inherent key escrow problem in the identity-based cryptography. Recently, Zhang et al.’s proposed the first RSA-based certificateless signature scheme and demonstrated that their scheme is provably secure in the random oracle model. In this paper, we will show that Zhang et al.’s scheme is insecure against a type I adversary who can replace users’ public keys. The analysis shows Zhang et al.’s scheme is not secure for practical applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Strong RSA-based and Certificateless-based Signature Scheme

The certificateless-based signature system allows people to verify the signature without the certificate. For this reason, we do not need the certificate authority (CA) to store and manage users’ certificates and public keys. Certificateless-based signature can also overcome the certificate management problem and the key escrow problem of the traditional signature system. In 2012, Zhang and Mao...

متن کامل

An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks

The entire world is looking to fulfill the need of the hour in terms of security. Certificateless cryptography is an efficient approach studied widely due to two reasons: first, it eliminates the need of certificate authority in public key infrastructure and second, it can resolve key escrow problem of ID-based cryptography. Recently, Zhang et al. proposed a novel security scheme based on RSA, ...

متن کامل

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

Multi-proxy Multi-signature without Pairing from Certificateless Cryptography

In a multi-proxy multi-signature scheme, there is a group of original signers who delegate their signing rights to another group of persons called proxy group. Most of the known cryptography schemes used bilinear pairings, the computation cost of the which is much higher than that of the exponentiation in a RSA group. In this paper, we propose a certificateless multi-proxy multi-signature schem...

متن کامل

Insecurity of a Certificate-free Ad Hoc Anonymous Authentication

The ring signature scheme is a simplified group signature scheme for no manager while preserving unconditionally anonymous of the signer. Certificateless cryptography is introduced for eliminating the use of certificates in Public Key Infrastructure and solving the key-escrow problem in ID-based cryptogratography. Recently, Qin et al. proposed the first RSA-based certificateless ring signature ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 16  شماره 

صفحات  -

تاریخ انتشار 2014