Pakniat et al., 2016 - Google Patents
Cryptanalysis of a certificateless aggregate signature schemePakniat et al., 2016
View PDF- Document ID
- 7996460163955849087
- Author
- Pakniat N
- Noroozi M
- Publication year
- Publication venue
- Cryptology ePrint Archive
External Links
Snippet
Recently, Nie et al. proposed a certificateless aggregate signature scheme. In the standard security model considered in certificateless cryptography, we are dealing with two types of adversaries. In this paper, we show that Nie et al.'s scheme is insecure against the …
- 230000003044 adaptive 0 abstract description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Efficient ID-based public auditing for the outsourced data in cloud storage | |
Li et al. | Hidden attribute-based signatures without anonymity revocation | |
Eslami et al. | Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model | |
Li et al. | Attribute-based ring signatures | |
Li et al. | Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks | |
Jiang et al. | Anonymous and efficient authentication scheme for privacy-preserving distributed learning | |
Xiong et al. | On the security of an identity based multi-proxy signature scheme | |
Pakniat et al. | Cryptanalysis and improvement of a pairing-free certificateless signature scheme | |
Yuan | Security analysis of an enhanced certificateless signcryption in the standard model | |
Ren et al. | Provably secure aggregate signcryption scheme | |
Cao et al. | Decentralized group signature scheme based on blockchain | |
Sahu et al. | Identity‐based multi‐proxy multi‐signature scheme provably secure in random oracle model | |
Zhou et al. | Certificateless public auditing scheme with data privacy preserving for cloud storage | |
Pakniat et al. | Cryptanalysis of a certificateless aggregate signature scheme | |
Zhou et al. | Certificate-based generalized ring signcryption scheme | |
Zheng et al. | Threshold attribute‐based signcryption and its application to authenticated key agreement | |
Gupta et al. | A Novel Identity-based Deniable Authentication Protocol Using Bilinear Pairings for Mobile Ad Hoc Networks. | |
Tian et al. | Cryptanalysis and improvement of a certificateless multi-proxy signature scheme | |
Shim | Security vulnerabilities of four signature schemes from NTRU lattices and pairings | |
Le et al. | Efficient certificate‐based encryption schemes without pairing | |
Ma et al. | Certificateless group inside signature | |
Kumar et al. | Insecurity of a secure certificate-based signature scheme | |
Islam et al. | Design of an efficient ID-based short designated verifier proxy signature scheme | |
Kumar et al. | A comment on efficient certificateless aggregate signature scheme | |
Xu et al. | New Efficient Certificateless Aggregate Signature Scheme |