Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC

In digital signature, strong unforgeability requires that an attacker cannot forge a new signature on any previously signed/new messages, which is attractive in both theory and practice. Recently, a strongly unforgeable certificateless signature (CLS) scheme without random oracles was presented. In...

Full description

Bibliographic Details
Main Authors: Wenjie Yang, Jian Weng, Weiqi Luo, Anjia Yang
Format: Article
Language:English
Published: Hindawi-Wiley 2017-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2017/5704865
id doaj-ee872de6eddc40f48bc8da8a40eccc0a
record_format Article
spelling doaj-ee872de6eddc40f48bc8da8a40eccc0a2020-11-24T21:26:42ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222017-01-01201710.1155/2017/57048655704865Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGCWenjie Yang0Jian Weng1Weiqi Luo2Anjia Yang3College of Information Science and Technology/College of Cyber Security, Jinan University, Guangzhou 510632, ChinaCollege of Information Science and Technology/College of Cyber Security, Jinan University, Guangzhou 510632, ChinaCollege of Information Science and Technology/College of Cyber Security, Jinan University, Guangzhou 510632, ChinaCollege of Information Science and Technology/College of Cyber Security, Jinan University, Guangzhou 510632, ChinaIn digital signature, strong unforgeability requires that an attacker cannot forge a new signature on any previously signed/new messages, which is attractive in both theory and practice. Recently, a strongly unforgeable certificateless signature (CLS) scheme without random oracles was presented. In this paper, we firstly show that the scheme fails to achieve strong unforgeability by forging a new signature on a previously signed message under its adversarial model. Then, we point out that the scheme is also vulnerable to the malicious-but-passive key generation center (MKGC) attacks. Finally, we propose an improved strongly unforgeable CLS scheme in the standard model. The improved scheme not only meets the requirement of strong unforgeability but also withstands the MKGC attacks. To the best of our knowledge, we are the first to prove a CLS scheme to be strongly unforgeable against the MKGC attacks without using random oracles.http://dx.doi.org/10.1155/2017/5704865
collection DOAJ
language English
format Article
sources DOAJ
author Wenjie Yang
Jian Weng
Weiqi Luo
Anjia Yang
spellingShingle Wenjie Yang
Jian Weng
Weiqi Luo
Anjia Yang
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC
Security and Communication Networks
author_facet Wenjie Yang
Jian Weng
Weiqi Luo
Anjia Yang
author_sort Wenjie Yang
title Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC
title_short Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC
title_full Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC
title_fullStr Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC
title_full_unstemmed Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC
title_sort strongly unforgeable certificateless signature resisting attacks from malicious-but-passive kgc
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2017-01-01
description In digital signature, strong unforgeability requires that an attacker cannot forge a new signature on any previously signed/new messages, which is attractive in both theory and practice. Recently, a strongly unforgeable certificateless signature (CLS) scheme without random oracles was presented. In this paper, we firstly show that the scheme fails to achieve strong unforgeability by forging a new signature on a previously signed message under its adversarial model. Then, we point out that the scheme is also vulnerable to the malicious-but-passive key generation center (MKGC) attacks. Finally, we propose an improved strongly unforgeable CLS scheme in the standard model. The improved scheme not only meets the requirement of strong unforgeability but also withstands the MKGC attacks. To the best of our knowledge, we are the first to prove a CLS scheme to be strongly unforgeable against the MKGC attacks without using random oracles.
url http://dx.doi.org/10.1155/2017/5704865
work_keys_str_mv AT wenjieyang stronglyunforgeablecertificatelesssignatureresistingattacksfrommaliciousbutpassivekgc
AT jianweng stronglyunforgeablecertificatelesssignatureresistingattacksfrommaliciousbutpassivekgc
AT weiqiluo stronglyunforgeablecertificatelesssignatureresistingattacksfrommaliciousbutpassivekgc
AT anjiayang stronglyunforgeablecertificatelesssignatureresistingattacksfrommaliciousbutpassivekgc
_version_ 1725977934318010368