You are not logged in.
Openly accessible

Cryptanalysis and improvement of an efficient certificateless signature scheme

Li, Jiguo, Huang, Xinyi, Mu, Yi and Wu, Wei 2008, Cryptanalysis and improvement of an efficient certificateless signature scheme, Journal of communications and networks, vol. 10, no. 1, pp. 10-17, doi: 10.1109/JCN.2008.6388323.

Attached Files
Name Description MIMEType Size Downloads
huang-cryptanalysis-2008.pdf Published version application/pdf 789.66KB 150

Title Cryptanalysis and improvement of an efficient certificateless signature scheme
Author(s) Li, Jiguo
Huang, Xinyi
Mu, Yi
Wu, Wei
Journal name Journal of communications and networks
Volume number 10
Issue number 1
Start page 10
End page 17
Total pages 8
Publisher IEEE
Place of publication Piscataway, N.J.
Publication date 2008-03
ISSN 1229-2370
Keyword(s) certificateless cryptography
certificateless signature
public key replacement attack
security analysis
Summary In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced. The advantage of certificate-less public key cryptography successfully eliminates the necessity of certificates in the traditional public key cryptography and simultaneously solves the inherent key escrow problem suffered in identity-based cryptography. Recently, Yap et al. proposed an efficient certificateless signature scheme and claimed that their scheme is existentially unforgeable in the random oracle model. In this paper, we show that the certificateless signature scheme proposed by Yap et al. is insecure against public key replacement attacks. Furthermore, we propose an improved certificateless signature scheme, which is existentially unforgeable against adaptive chosen message attacks under the computational Diffie-Hellman assumption in the random oracle model and provide the security proof of the proposed scheme.
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Language eng
DOI 10.1109/JCN.2008.6388323
Field of Research 109999 Technology not elsewhere classified
Socio Economic Objective 970110 Expanding Knowledge in Technology
HERDC Research category C1.1 Refereed article in a scholarly journal
Copyright notice ©2008, IEEE
Free to Read? Yes
Persistent URL http://hdl.handle.net/10536/DRO/DU:30064476

Document type: Journal Article
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 25 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 30 Abstract Views, 147 File Downloads  -  Detailed Statistics
Created: Fri, 13 Jun 2014, 12:27:04 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.