On the Security of Certificateless Signature Schemes

Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security. Certificateless public key cryptography (CL-PKC) deals effectivel...

Full description

Saved in:
Bibliographic Details
Main Authors: Gaurav Sharma, Suman Bala, Anil K. Verma
Format: Article
Language:English
Published: Wiley 2013-06-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2013/102508
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832547951052849152
author Gaurav Sharma
Suman Bala
Anil K. Verma
author_facet Gaurav Sharma
Suman Bala
Anil K. Verma
author_sort Gaurav Sharma
collection DOAJ
description Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security. Certificateless public key cryptography (CL-PKC) deals effectively with the twin issues of certificate management in traditional public key cryptography and key escrow problem in identity-based cryptography. CL-PKC has attracted special attention in the field of information security as it has opened new avenues for improvement in the present security architecture. Recently, Tsai et al. proposed an improved certificateless signature scheme without pairing and claimed that their new construction is secure against different kinds of attacks. In this paper, we present a security analysis of their scheme and our results show that scheme does not have resistance against malicious-KGC attack. In addition, we have found some security flaws in the certificateless signature scheme of Fan et al. and proved the scheme vulnerable to Strong Type I attack.
format Article
id doaj-art-d604e7976fe441cd961dc0202479189d
institution Kabale University
issn 1550-1477
language English
publishDate 2013-06-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-d604e7976fe441cd961dc0202479189d2025-02-03T06:42:59ZengWileyInternational Journal of Distributed Sensor Networks1550-14772013-06-01910.1155/2013/102508On the Security of Certificateless Signature SchemesGaurav SharmaSuman BalaAnil K. VermaWireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security. Certificateless public key cryptography (CL-PKC) deals effectively with the twin issues of certificate management in traditional public key cryptography and key escrow problem in identity-based cryptography. CL-PKC has attracted special attention in the field of information security as it has opened new avenues for improvement in the present security architecture. Recently, Tsai et al. proposed an improved certificateless signature scheme without pairing and claimed that their new construction is secure against different kinds of attacks. In this paper, we present a security analysis of their scheme and our results show that scheme does not have resistance against malicious-KGC attack. In addition, we have found some security flaws in the certificateless signature scheme of Fan et al. and proved the scheme vulnerable to Strong Type I attack.https://doi.org/10.1155/2013/102508
spellingShingle Gaurav Sharma
Suman Bala
Anil K. Verma
On the Security of Certificateless Signature Schemes
International Journal of Distributed Sensor Networks
title On the Security of Certificateless Signature Schemes
title_full On the Security of Certificateless Signature Schemes
title_fullStr On the Security of Certificateless Signature Schemes
title_full_unstemmed On the Security of Certificateless Signature Schemes
title_short On the Security of Certificateless Signature Schemes
title_sort on the security of certificateless signature schemes
url https://doi.org/10.1155/2013/102508
work_keys_str_mv AT gauravsharma onthesecurityofcertificatelesssignatureschemes
AT sumanbala onthesecurityofcertificatelesssignatureschemes
AT anilkverma onthesecurityofcertificatelesssignatureschemes