2012 | OriginalPaper | Buchkapitel
On the Security of Two Certificateless Signature Schemes
verfasst von : Young-Ran Lee
Erschienen in: Advances in Computer Science, Engineering & Applications
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
Recently, Xiao
$et \ al.$
proposed a strong designated verifier certificateless signature scheme. Zhang
$et \ al.$
claimed that Xiao
$et \ al.$
’s scheme is vulnerable to key replacement attacks. In this paper, we show that Zhang
$et \ al.$
’s cryptanalysis on Xiao
$et \ al.$
’s scheme is incorrect and Xiao
$et \ al.$
’s scheme is insecure against key replacement attacks. On the other hand, Li
$et \ al.$
proposed a certificateless signature scheme without
MapToPoint
. It is shown that an adversary who replaces the public key of a signer can forge valid signatures for that signer without knowledge of the signer’s private key.