Security Analysis of Two Lightweight Certificateless Signature Schemes

سال انتشار: 1397
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 219

فایل این مقاله در 7 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_JCSE-5-2_002

تاریخ نمایه سازی: 21 فروردین 1400

چکیده مقاله:

Certificateless cryptography can be considered as an intermediate solution to overcome the issues in traditional public key infrastructure (PKI) and identity-based public key cryptography (ID-PKC). There exist a vast number of certificateless signature (CLS) schemes in the literature; however, most of them are not efficient enough to be utilized in limited resources environments such as Internet of things (IoT) or Healthcare Wireless Sensor Networks (HWSN). Recently, two lightweight CLS schemes have been proposed by Karati et al. and Kumar et al. to be employed in IoT and HWSNs, respectively. While both schemes are claimed to be existentially unforgeable, in this paper, we show that both these signatures can easily be forged. More specifically, it is shown that 1) in Karati et al.'s scheme, a type 1 adversary, considered in certificateless cryptography, can generate a valid partial private key corresponding to any user of its choice and as a consequence, it can forge any users' signature on any message of its choice, and 2) in Kumar et al.'s scheme, both types of adversaries which are considered in certificateless cryptography are able to forge any signer's signature on an arbitrary message.

کلیدواژه ها:

Certificateless cryptography ، Cryptanalysis ، Signature ، Industrial Internet of Things ، Healthcare Wireless Sensor Networks

نویسندگان

Nasrollah Pakniat

Information Science Research Center, Iranian Research Institute for Information Science and Technology (IRANDOC), Tehran, Iran.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • N. Pakniat and B. A. Vanda. Cryptanalysis and Improvement of a Pairing-Free ...
  • N. Pakniat and M. Noroozi. Cryptanalysis of a certificateless aggregate signature scheme. ...
  • Pankaj Kumar, Saru Kumari, Vishnu Sharma, Arun Kumar Sangaiah, Jianghong Wei, ...
  • Liaojun Pang, Yufei Hu, Yi Liu, Kedong Xu, and Huixian Li. ...
  • Liangliang Wang, Kefei Chen, Yu Long, and Huige Wang. An efficient ...
  • Yumin Yuan and Chenhui Wang. Certificateless signature scheme with security ...
  • Jianhong Zhang and Jane Mao. An efficient RSA-based certificateless signature ...
  • Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, and Wei Wu. ...
  • Yang Lu and Jiguo Li. Provably secure certificateless proxy signature ...
  • Ziba Eslami and Nasrollah Pakniat. A certificateless proxy signature scheme ...
  • Seung-Hyun Seo, Kyu Young Choi, Jung Yeon Hwang, and Seungjoo Kim. Efficient ...
  • C. Hu and D. Li. A New Type of Proxy Ring Signature ...
  • Deng, Lunzhi. Certificateless ring signature based on rsa problem and ...
  • Lijun Zhu and Futai Zhang. An efficient certificateless ring signature ...
  • Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, and Liming ...
  • Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang, and Gwoboa ...
  • Shi-Jinn Horng, Shiang-Feng Tzeng, Po-Hsian Huang, Xian Wang, Tianrui Li, ...
  • Hu Xiong, Zhi Guan, Zhong Chen, and Fagen Li. An efficient ...
  • Ziba Eslami and Nasrollah Pakniat. Certificateless aggregate signcryption: Security model ...
  • Yang Chen, Yang Zhao, Hu Xiong, and Feng Yue. A Certificateless ...
  • Xinyi Huang, W. Susilo, Yi Mu, and Futai Zhang. Certificateless Designated Verifier ...
  • Hong Yuan, Futai Zhang, Xinyi Huang, Yi Mu, Willy Susilo, and ...
  • Licheng Wang, Zhenfu Cao, Xiangxue Li, and Haifeng Qian. Simulatability ...
  • Licheng Wang, Zhenfu Cao, Xiangxue Li, and Haifeng Qian. Certificateless ...
  • Sattam S. Al-Riyami and Kenneth G. Paterson. Certificateless Public Key Cryptography. In ...
  • Adi Shamir. Identity-Based Cryptosystems and Signature Schemes. In George Robert Blakley ...
  • A. Karati, S. H. Islam, and M. Karuppiah. Provably Secure and Lightweight Certificateless ...
  • نمایش کامل مراجع