Skip to main content

Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme

  • Conference paper
Advances in Intelligent Systems and Applications - Volume 2

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 21))

  • 2949 Accesses

Abstract

Certificateless public key cryptography, introduced by Al-Riyami and Paterson, simplifies the complex certificate management in PKI-based public key cryptography and solves the key escrow problem of identity-based cryptography. Huang et al. in 2007 showed security models of certificateless signature to simulate possible adversaries according to their attack abilities. Recently, Choi et al. proposed a certificateless short signature scheme. They claimed their scheme to be the only certificateless short signature scheme achieving the strongest security level presented by Huang et al.. They also give their security proofs to support their claim. However, we find that their scheme is not as secure as the authors claimed. In this paper, we give comments on the paper of Choi et al. including the cryptanalysis of their scheme and the weakness of the security proof.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Chen, Y.C., Liu, C.L., Horng, G., Chen, K.C.: A provably secure certificateless proxy signature scheme. International Journal of Innovative Computing, Information and Control 7(9), 5557–5569 (2011)

    Google Scholar 

  4. Choi, K.Y., Park, J.H., Hwang, J.Y., Lee, D.H.: Efficient Certificateless Signature Schemes. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 443–458. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Choi, K., Park, J., Lee, D.: A new provably secure certificateless short signature scheme. Computers and Mathematics with Applications 61, 1760–1768 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  6. Du, H., Wen, Q.: Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Computer Standards & Interfaces 31, 390–394 (2009)

    Article  Google Scholar 

  7. Fan, C.I., Hsu, R.H., Ho, P.H.: Truly non-repudiation certificateless short signature scheme from bilinear pairings. Journal of Information Science and Engineering 24, 969–982 (2011)

    MathSciNet  Google Scholar 

  8. Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Certificateless signature: a new security model and an improved generic construction. Designs, Codes and Cryptography 42(2), 109–126 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  9. Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless Signature Revisited. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 308–322. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  10. Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signatures: new schemes and security models. Computer Journal (2011), doi:10.1093/comjnl/bxr097

    Google Scholar 

  11. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  12. Shim, K.: Breaking the short certificateless signature scheme. Information Sciences 179, 303–306 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  13. Tso, R., Yi, X., Huang, X.: Efficient and short certificateless signatures secure against realistic adversaries. Journal of Supercomputing 55, 173–191 (2011)

    Article  Google Scholar 

  14. Tso, R., Huang, X., Susilo, W.: Strongly secure certificateless short signatures. Journal of Systems and Software 85, 1409–1417 (2012)

    Article  Google Scholar 

  15. Yum, D.H., Lee, P.J.: Generic Construction of Certificateless Signature. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 200–211. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Chi Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, YC., Tso, R., Horng, G. (2013). Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme. In: Pan, JS., Yang, CN., Lin, CC. (eds) Advances in Intelligent Systems and Applications - Volume 2. Smart Innovation, Systems and Technologies, vol 21. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35473-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35473-1_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35472-4

  • Online ISBN: 978-3-642-35473-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics