Title :
Attacks against Two Provably Secure Certificateless Signature Schemes
Author :
Guozheng, Hu ; Fan, Hong
Author_Institution :
Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
Abstract :
Certificateless cryptography, first introduced by Al-Riyami and Paterson in 2003, can solve the key escrow problem which is inherent in identity-based (ID-based) cryptography and eliminate the use of certificates as in the conventional Public Key Infrastructure (PKI). Recently, Xu et al. proposed a certificateless signature scheme and Yang et al. presented a mediated certificateless signature scheme .They all claimed that their schemes are secure and efficient and gave security proofs of the schemes. In this paper, we analyze the two certificateless signature schemes and show that the two schemes are insecure against key replacement attacks and malicious KGC(key generation centre) attacks.
Keywords :
public key cryptography; certificateless cryptography; certificateless signature schemes security; identity-based cryptography; key generation centre attacks; public key infrastructure; Computer science; Gold; Identity management systems; Identity-based encryption; Public key; Public key cryptography; Security; certificateless signature; malicious KGC attacks; replacement public key attacks;
Conference_Titel :
Information Engineering, 2009. ICIE '09. WASE International Conference on
Conference_Location :
Taiyuan, Chanxi
Print_ISBN :
978-0-7695-3679-8
DOI :
10.1109/ICIE.2009.88