Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Analysis and improvement of certificateless signature scheme
ZHAO Hong, YU Shuhan, HAN Yanyan, LI Zhaobin
Journal of Computer Applications    2023, 43 (1): 147-153.   DOI: 10.11772/j.issn.1001-9081.2021111919
Abstract446)   HTML36)    PDF (910KB)(218)       Save
For nine certificateless signature schemes proposed by Y L Tang, et al. (TANG Y L, WANG F F, YE Q, et al. Improved provably secure certificateless signature scheme. Journal of Beijing University of Posts and Telecommunications, 2016, 39(1): 112-116), firstly, the linearized equation analysis method was used. It was found that there was a linear relationship between the public keys in all schemes. This defect was exploited to complete a signature forgery attack on all schemes. Secondly, in order to break the linear relationship between the public keys, the method of modifying the parameters of hash function was used to improve the scheme, and the security of the improved scheme was proved under the random oracle model. Thirdly, a public key construction format of certificateless signature scheme was proposed. The signature scheme constructed by this format could not be attacked by adversaries using public key replacement. Finally, the efficiency of the improved scheme was compared with those of the existing certificateless signature schemes through simulation. Experimental results show that the improved scheme promotes the security without reducing the computational efficiency.
Reference | Related Articles | Metrics