Security analysis and improvement of strongly secure certificate less signature scheme
By analyzing the security of strongly secure certificateless signature scheme proposed by Wang Yafei et al, the problem that the scheme could not resist public key replacement attack under dishonest KGC was pointed out. Aiming at this problem, the behavior of KGC was restrained by the change of trad...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2014-05-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.05.016/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539730504679424 |
---|---|
author | Ai-wan FAN Zhao-feng YANG Li-ming XIE |
author_facet | Ai-wan FAN Zhao-feng YANG Li-ming XIE |
author_sort | Ai-wan FAN |
collection | DOAJ |
description | By analyzing the security of strongly secure certificateless signature scheme proposed by Wang Yafei et al, the problem that the scheme could not resist public key replacement attack under dishonest KGC was pointed out. Aiming at this problem, the behavior of KGC was restrained by the change of traditional certificateless algorithm sequence KGC bulletin board where user public key make public, and verifiability of facticity of public key through the local private keys and public keys. The analysis of security shows that the improved scheme cannot only resist the public key replace-ment attack based on dishonest KGC, but also be more efficient than the existing schemes for avoiding pairings and in-verse operation. |
format | Article |
id | doaj-art-550dee0510a44ca6b9b57e417297d65e |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2014-05-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-550dee0510a44ca6b9b57e417297d65e2025-01-14T06:43:23ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2014-05-013511812359681601Security analysis and improvement of strongly secure certificate less signature schemeAi-wan FANZhao-feng YANGLi-ming XIEBy analyzing the security of strongly secure certificateless signature scheme proposed by Wang Yafei et al, the problem that the scheme could not resist public key replacement attack under dishonest KGC was pointed out. Aiming at this problem, the behavior of KGC was restrained by the change of traditional certificateless algorithm sequence KGC bulletin board where user public key make public, and verifiability of facticity of public key through the local private keys and public keys. The analysis of security shows that the improved scheme cannot only resist the public key replace-ment attack based on dishonest KGC, but also be more efficient than the existing schemes for avoiding pairings and in-verse operation.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.05.016/certificateless signaturepublic key replacement attackbilinear pairingdiscrete logarithm problem |
spellingShingle | Ai-wan FAN Zhao-feng YANG Li-ming XIE Security analysis and improvement of strongly secure certificate less signature scheme Tongxin xuebao certificateless signature public key replacement attack bilinear pairing discrete logarithm problem |
title | Security analysis and improvement of strongly secure certificate less signature scheme |
title_full | Security analysis and improvement of strongly secure certificate less signature scheme |
title_fullStr | Security analysis and improvement of strongly secure certificate less signature scheme |
title_full_unstemmed | Security analysis and improvement of strongly secure certificate less signature scheme |
title_short | Security analysis and improvement of strongly secure certificate less signature scheme |
title_sort | security analysis and improvement of strongly secure certificate less signature scheme |
topic | certificateless signature public key replacement attack bilinear pairing discrete logarithm problem |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.05.016/ |
work_keys_str_mv | AT aiwanfan securityanalysisandimprovementofstronglysecurecertificatelesssignaturescheme AT zhaofengyang securityanalysisandimprovementofstronglysecurecertificatelesssignaturescheme AT limingxie securityanalysisandimprovementofstronglysecurecertificatelesssignaturescheme |