Advertisement

On the Security of Two Certificateless Signature Schemes

  • Young-Ran Lee
Part of the Advances in Intelligent Systems and Computing book series (volume 167)

Abstract

Recently, Xiao \(et \ al.\) proposed a strong designated verifier certificateless signature scheme. Zhang \(et \ al.\) claimed that Xiao \(et \ al.\)’s scheme is vulnerable to key replacement attacks. In this paper, we show that Zhang \(et \ al.\)’s cryptanalysis on Xiao \(et \ al.\)’s scheme is incorrect and Xiao \(et \ al.\)’s scheme is insecure against key replacement attacks. On the other hand, Li \(et \ al.\) proposed a certificateless signature scheme without MapToPoint. It is shown that an adversary who replaces the public key of a signer can forge valid signatures for that signer without knowledge of the signer’s private key.

Keywords

Signature Scheme Bilinear Pairing Sign Oracle Certificateless Signature Scheme 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Castro, R., Dahab, R.: Two Notes on the Security of Certificateless Signatures. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 85–102. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  3. 3.
    Choi, K.Y., Park, J.H., Hwang, J.Y., Lee, D.H.: Efficient Certificateless Signature Schemes. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 443–458. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  4. 4.
    Chen, H., Song, R., Zhang, F., Song, F.: An efficient certificateless short designated verifier signature scheme. In: 4th IEEE International Conference on Wireless Communications, Networking and Mobile Compting, pp. 1–6. IEEE Press, New York (2008)Google Scholar
  5. 5.
    Du, H., Wen, Q.: Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Computer Standards and Interfaces 31(2), 390–394 (2009)CrossRefGoogle Scholar
  6. 6.
    Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless Signature Revisited. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 308–322. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  7. 7.
    Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the Security of Certificateless Signature Schemes from Asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 13–25. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  8. 8.
    Huang, X., Susilo, W., Mu, Y., Zhang, F.: Certificateless designated verifier signature schemes. In: Proceedings of 20th International Conference on Advanced Information Networking and Applications, pp. 15–19. IEEE Press, New York (2006)Google Scholar
  9. 9.
    Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Certificateless signature: a new security model and an improved generic construction. Des. Codes Crypt. 42, 109–126 (2007)MathSciNetzbMATHCrossRefGoogle Scholar
  10. 10.
    Jakobsson, M., Sako, K., Impagliazzo, R.: Designated Verifier Proofs and Their Applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)Google Scholar
  11. 11.
    Liu, J.K., Au, M.H., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Proceedings of ACM Symposium on Information, Computer and Communications Security, pp. 273–283. ACM, New York (2007)Google Scholar
  12. 12.
    Li, F., Liu, P.: An efficient certificateless signature scheme from bilinear pairing. In: Proceedings of IEEE International Conference on Network Computing and Information Security, pp. 35–37. IEEE Press, New York (2011)CrossRefGoogle Scholar
  13. 13.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  14. 14.
    Saeednia, S., Kremer, S., Markowitch, O.: An Efficient Strong Designated Verifier Signature Scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 40–54. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  15. 15.
    Tso, R., Yi, X., Huang, X.: Efficient and Short Certificateless Signature. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 64–79. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  16. 16.
    Xiong, H., Qin, Z., Li, F.: An improved certificateless signature scheme secure in the standard model. Fundamenta Informaticae 88, 193–206 (2008)MathSciNetzbMATHGoogle Scholar
  17. 17.
    Xiao, Z., Yang, B., Li, S.: Certificateless strong designated verifier signature scheme. In: Proceedings of 2nd International Conference on e-Business and Information Systeme Security, pp. 1–5. IEEE Press, New York (2010)Google Scholar
  18. 18.
    Yang, B., Hu, Z., Xiao, Z.: Efficient certificateless strong designated verifier signature scheme. In: International Conference on Computational Intelligence and Security, pp. 432–436. IEEE Press, New York (2009)CrossRefGoogle Scholar
  19. 19.
    Yum, D.H., Lee, P.J.: Generic Construction of Certificateless Signature. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 200–211. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  20. 20.
    Zhang, Z., Wong, D.S., Xu, J., Feng, D.: Certificateless Public-Key Signature: Security Model and Efficient Construction. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 293–308. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  21. 21.
    Zhang, J., Xie, J.: Breaking a certificateless strong designated verifier signature scheme. In: Proceedings of International Conference on Consumer Electronics, Communications and Networks, pp. 130–133. IEEE Press, New York (2011)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Division of Fusion and Convergence of Mathematical SciencesNational Institute for Mathematical SciencesDaejeonKorea

Personalised recommendations