Security analysis of two lightweight certificateless signature schemes

09/24/2019
by   Nasrollah Pakniat, et al.
0

Certificateless cryptography can be considered as an intermediate solution to overcome the issues in traditional public key infrastructure (PKI) and identity-based public key cryptography (ID-PKC). There exist a vast number of certificateless signature (CLS) schemes in the literature; however, most of them are not efficient enough to be utilized in limited resources environments such as Internet of things (IoT) or Healthcare Wireless Sensor Networks (HWSN). Recently, two lightweight CLS schemes have been proposed by Karati et al. and Kumar et al. to be employed in IoT and HWSNs, respectively. While both schemes are claimed to be existentially unforgeable, in this paper, we show that both these signatures can easily be forged. More specifically, it is shown that 1) in Karati et al.'s scheme, a type 1 adversary, considered in certificateless cryptography, can generate a valid partial private key corresponding to any user of its choice and as a consequence, it can forge any users' signature on any message of its choice, and 2) in Kumar et al.'s scheme, both types of adversaries which are considered in certificateless cryptography are able to forge any signer's signature on an arbitrary message.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/25/2017

A Provably Secure Ring Signature Scheme in Certificateless Cryptography

Ring signature is a kind of group-oriented signature. It allows a member...
research
02/01/2019

Key Recovery Attack on Rank Quasi-Cyclic Code-based Signature Scheme

Rank Quasi-Cyclic Signature (RQCS) is a rank metric code-based signature...
research
02/20/2022

Redactable Signature with Compactness from Set-Commitment

Redactable signature allows anyone to remove parts of a signed message w...
research
11/16/2020

Cryptanalysis of a code-based full-time signature

We present an attack against a code-based signature scheme based on the ...
research
01/26/2018

Lattice-Based Group Signatures: Achieving Full Dynamicity (and Deniability) with Ease

In this work, we provide the first lattice-based group signature that of...
research
10/17/2020

A Key-Agreement Protocol Based on Static Parameters and Hash Functions

Wireless Body Sensor Network (WBSN) is a developing technology with cons...
research
07/31/2022

Modification tolerant signature schemes: location and correction

This paper considers malleable digital signatures, for situations where ...

Please sign up or login with your details

Forgot password? Click here to reset