[ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ]

Journal of Information Science and Engineering, Vol. 33 No. 4, pp. 873-889

Strongly Secure Certificateless Signature Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack Ability

1Fujian Provincial Key Laboratory of Network Security and Cryptology
School of Mathematics and Computer Science
Fujian Normal University
Fuzhou, Fujian, 350117 P.R. China

2College of Mathematics and Physics
Fujian Provincial Key Laboratory of Big Data Mining and Applications
Fujian University of Technology
Fuzhou, Fujian, 350118 P.R. China
E-mail: w.h.feng@163.com; xuli@fjnu.edu.cn*

Digital signature is an important cryptographic tool in the security and privacy of smart city. Certificateless signature has not only simplified certificate management of traditional public-key signature, but also solved the private key escrow problem of ID-based signature. Recently, Pang et al.'s proposed a certificateless signature scheme in the standard model. We find that their scheme is vulnerable to the attack of maliciousbut passive KGC adversary. From the analysis of Pang et al.'s secure proof, we give a suggestion for the proof of certificateless signature, i.e., we cannot remain some possible trapdoor information for KGC. Then we propose a strongly secure certificateless signature
scheme, and give the secure proof in standard model. Compared with Pang et al.'s and other certificateless signature scheme in standard model, our proposed scheme can resist attack of malicious-but-passive KGC adversary.

Keywords: certificateless signature, smart city, malicious-but-passive KGC attack, public key replacement attack, standard model

  Retrieve PDF document (JISE_201704_01.pdf)