Skip to main content
Top
Published in: Wireless Personal Communications 3/2022

19-08-2021

Cryptanalysis of Two Signature Schemes for IoT and Mobile Health Systems

Authors: Feihong Xu, Hui Zeng

Published in: Wireless Personal Communications | Issue 3/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recently, Lee et al. (Sensors 20(14): 3983, 2020) proposed a certificateless aggregate arbitrated signature scheme CLAAS for IoT environments. Addobea et al. (Secur Commun Networks 7085623: 1–7085623: 12, 2020) constructed an offline-online certificateless signature scheme MHCOOS for mobile health applications. The schemes were proven to be secure against both Type I and Type II adversaries in the random oracle model under the hardness assumptions of cryptographic problems. In this work, we first show that the CLAAS scheme is insecure against a Type I adversary who can replace the user’s public key. We also show that the MHCOOS scheme cannot achieve correctness, a fundamental security property that a signature scheme should provide. As a result, the above two signature schemes cannot be deployed in practical IoT and mobile applications.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Addobea, A.A., Hou, J., & Li, Q. (2020). MHCOOS: An offline-online certificateless signature scheme for m-health devices. Secur. Commun. Networks 2020, 7085623:1–7085623:12. Addobea, A.A., Hou, J., & Li, Q. (2020). MHCOOS: An offline-online certificateless signature scheme for m-health devices. Secur. Commun. Networks 2020, 7085623:1–7085623:12.
2.
go back to reference Al-Riyami, S.S., & Paterson, K.G. (2003) Certificateless public key cryptography. In C. Laih (Ed.), Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, Lecture Notes in Computer Science (Vol. 2894, pp. 452–473). Springer. Al-Riyami, S.S., & Paterson, K.G. (2003) Certificateless public key cryptography. In C. Laih (Ed.), Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, Lecture Notes in Computer Science (Vol. 2894, pp. 452–473). Springer.
3.
go back to reference Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2003). Aggregate and verifiably encrypted signatures from bilinear maps. In: E. Biham (Ed.,) Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, Lecture Notes in Computer Science (Vol. 2656, pp. 416–432). Springer. Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2003). Aggregate and verifiably encrypted signatures from bilinear maps. In: E. Biham (Ed.,) Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, Lecture Notes in Computer Science (Vol. 2656, pp. 416–432). Springer.
4.
go back to reference Delfs, H., & Knebl, H. (2015). Introduction to cryptography - principles and applications (3rd ed.). Information Security and Cryptography: Springer.MATH Delfs, H., & Knebl, H. (2015). Introduction to cryptography - principles and applications (3rd ed.). Information Security and Cryptography: Springer.MATH
5.
go back to reference Galbraith, S. D., Paterson, K. G., & Smart, N. P. (2008). Pairings for cryptographers. Discrete Applied Mathematics, 156(16), 3113–3121.MathSciNetCrossRef Galbraith, S. D., Paterson, K. G., & Smart, N. P. (2008). Pairings for cryptographers. Discrete Applied Mathematics, 156(16), 3113–3121.MathSciNetCrossRef
6.
go back to reference Karati, A., Islam, S. H., & Karuppiah, M. (2018). Provably secure and lightweight certificateless signature scheme for iiot environments. IEEE Transactions on Industrial Informatics, 14(8), 3701–3711.CrossRef Karati, A., Islam, S. H., & Karuppiah, M. (2018). Provably secure and lightweight certificateless signature scheme for iiot environments. IEEE Transactions on Industrial Informatics, 14(8), 3701–3711.CrossRef
7.
go back to reference Lee, D., Yim, K., & Lee, I. (2020). A certificateless aggregate arbitrated signature scheme for iot environments. Sensors, 20(14), 3983.CrossRef Lee, D., Yim, K., & Lee, I. (2020). A certificateless aggregate arbitrated signature scheme for iot environments. Sensors, 20(14), 3983.CrossRef
8.
go back to reference Paterson, K. G., & Price, G. (2003). A comparison between traditional public key infrastructures and identity-based cryptography. Information Security Technical Report, 8(3), 57–72.CrossRef Paterson, K. G., & Price, G. (2003). A comparison between traditional public key infrastructures and identity-based cryptography. Information Security Technical Report, 8(3), 57–72.CrossRef
10.
go back to reference Thumbur, G., Rao, G. S., Reddy, P. V., Gayathri, N. B., & Reddy, D. V. R. K. (2020). Efficient pairing-free certificateless signature scheme for secure communication in resource-constrained devices. IEEE Communications Letters, 24(8), 1641–1645.CrossRef Thumbur, G., Rao, G. S., Reddy, P. V., Gayathri, N. B., & Reddy, D. V. R. K. (2020). Efficient pairing-free certificateless signature scheme for secure communication in resource-constrained devices. IEEE Communications Letters, 24(8), 1641–1645.CrossRef
11.
go back to reference Yum, D.H., & Lee, P.J. (2004). Identity-based cryptography in public key management. In EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings (Vol. 3093, pp. 71–84). Springer. Yum, D.H., & Lee, P.J. (2004). Identity-based cryptography in public key management. In EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings (Vol. 3093, pp. 71–84). Springer.
Metadata
Title
Cryptanalysis of Two Signature Schemes for IoT and Mobile Health Systems
Authors
Feihong Xu
Hui Zeng
Publication date
19-08-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08979-y

Other articles of this Issue 3/2022

Wireless Personal Communications 3/2022 Go to the issue