Loading [MathJax]/extensions/MathMenu.js
Top-Level Secure Certificateless Signature Against Malicious-But-Passive KGC | IEEE Journals & Magazine | IEEE Xplore

Top-Level Secure Certificateless Signature Against Malicious-But-Passive KGC


The security of our CLS scheme can be reduced to WDS, PIBS and CRH without using random oracles.

Abstract:

Certificateless signature (CLS) has no need of public key certificates and also avoids excessive dependence to a third party like that in identity-based setting. Recently...Show More

Abstract:

Certificateless signature (CLS) has no need of public key certificates and also avoids excessive dependence to a third party like that in identity-based setting. Recently, Shim (IEEE Systems Journal, doi:10.1109/JSYST.2018.2844809) came up with a CLS scheme independent of random oracles and asserted that the construction can be immune to the public key replacement attacks and the malicious-but-passive key generation center (KGC) attacks. In this paper, we analyze the security of Shim's scheme and point out that his conclusions are incorrect by giving two concrete counter-examples. We repair the scheme and put forward a CLS scheme secure against public key replacement attacks and malicious-but-passive KGC attacks without relying on random oracles. Compared with Shim's scheme, our construction has lower execution cost for signing and verification, and achieves Girault's top-level security, which means that a victim can repudiate the forgeries based on a false secret key generated by the KGC.
The security of our CLS scheme can be reduced to WDS, PIBS and CRH without using random oracles.
Published in: IEEE Access ( Volume: 7)
Page(s): 112870 - 112878
Date of Publication: 14 August 2019
Electronic ISSN: 2169-3536

Funding Agency:


References

References is not available for this document.