Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC
In digital signature, strong unforgeability requires that an attacker cannot forge a new signature on any previously signed/new messages, which is attractive in both theory and practice. Recently, a strongly unforgeable certificateless signature (CLS) scheme without random oracles was presented. In...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2017-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2017/5704865 |
id |
doaj-ee872de6eddc40f48bc8da8a40eccc0a |
---|---|
record_format |
Article |
spelling |
doaj-ee872de6eddc40f48bc8da8a40eccc0a2020-11-24T21:26:42ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222017-01-01201710.1155/2017/57048655704865Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGCWenjie Yang0Jian Weng1Weiqi Luo2Anjia Yang3College of Information Science and Technology/College of Cyber Security, Jinan University, Guangzhou 510632, ChinaCollege of Information Science and Technology/College of Cyber Security, Jinan University, Guangzhou 510632, ChinaCollege of Information Science and Technology/College of Cyber Security, Jinan University, Guangzhou 510632, ChinaCollege of Information Science and Technology/College of Cyber Security, Jinan University, Guangzhou 510632, ChinaIn digital signature, strong unforgeability requires that an attacker cannot forge a new signature on any previously signed/new messages, which is attractive in both theory and practice. Recently, a strongly unforgeable certificateless signature (CLS) scheme without random oracles was presented. In this paper, we firstly show that the scheme fails to achieve strong unforgeability by forging a new signature on a previously signed message under its adversarial model. Then, we point out that the scheme is also vulnerable to the malicious-but-passive key generation center (MKGC) attacks. Finally, we propose an improved strongly unforgeable CLS scheme in the standard model. The improved scheme not only meets the requirement of strong unforgeability but also withstands the MKGC attacks. To the best of our knowledge, we are the first to prove a CLS scheme to be strongly unforgeable against the MKGC attacks without using random oracles.http://dx.doi.org/10.1155/2017/5704865 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Wenjie Yang Jian Weng Weiqi Luo Anjia Yang |
spellingShingle |
Wenjie Yang Jian Weng Weiqi Luo Anjia Yang Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC Security and Communication Networks |
author_facet |
Wenjie Yang Jian Weng Weiqi Luo Anjia Yang |
author_sort |
Wenjie Yang |
title |
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC |
title_short |
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC |
title_full |
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC |
title_fullStr |
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC |
title_full_unstemmed |
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC |
title_sort |
strongly unforgeable certificateless signature resisting attacks from malicious-but-passive kgc |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2017-01-01 |
description |
In digital signature, strong unforgeability requires that an attacker cannot forge a new signature on any previously signed/new messages, which is attractive in both theory and practice. Recently, a strongly unforgeable certificateless signature (CLS) scheme without random oracles was presented. In this paper, we firstly show that the scheme fails to achieve strong unforgeability by forging a new signature on a previously signed message under its adversarial model. Then, we point out that the scheme is also vulnerable to the malicious-but-passive key generation center (MKGC) attacks. Finally, we propose an improved strongly unforgeable CLS scheme in the standard model. The improved scheme not only meets the requirement of strong unforgeability but also withstands the MKGC attacks. To the best of our knowledge, we are the first to prove a CLS scheme to be strongly unforgeable against the MKGC attacks without using random oracles. |
url |
http://dx.doi.org/10.1155/2017/5704865 |
work_keys_str_mv |
AT wenjieyang stronglyunforgeablecertificatelesssignatureresistingattacksfrommaliciousbutpassivekgc AT jianweng stronglyunforgeablecertificatelesssignatureresistingattacksfrommaliciousbutpassivekgc AT weiqiluo stronglyunforgeablecertificatelesssignatureresistingattacksfrommaliciousbutpassivekgc AT anjiayang stronglyunforgeablecertificatelesssignatureresistingattacksfrommaliciousbutpassivekgc |
_version_ |
1725977934318010368 |