[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Pakniat et al., 2016 - Google Patents

Cryptanalysis of a certificateless aggregate signature scheme

Pakniat et al., 2016

View PDF
Document ID
7996460163955849087
Author
Pakniat N
Noroozi M
Publication year
Publication venue
Cryptology ePrint Archive

External Links

Snippet

Recently, Nie et al. proposed a certificateless aggregate signature scheme. In the standard security model considered in certificateless cryptography, we are dealing with two types of adversaries. In this paper, we show that Nie et al.'s scheme is insecure against the …
Continue reading at eprint.iacr.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys

Similar Documents

Publication Publication Date Title
Zhang et al. Efficient ID-based public auditing for the outsourced data in cloud storage
Li et al. Hidden attribute-based signatures without anonymity revocation
Eslami et al. Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model
Li et al. Attribute-based ring signatures
Li et al. Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
Jiang et al. Anonymous and efficient authentication scheme for privacy-preserving distributed learning
Xiong et al. On the security of an identity based multi-proxy signature scheme
Pakniat et al. Cryptanalysis and improvement of a pairing-free certificateless signature scheme
Yuan Security analysis of an enhanced certificateless signcryption in the standard model
Ren et al. Provably secure aggregate signcryption scheme
Cao et al. Decentralized group signature scheme based on blockchain
Sahu et al. Identity‐based multi‐proxy multi‐signature scheme provably secure in random oracle model
Zhou et al. Certificateless public auditing scheme with data privacy preserving for cloud storage
Pakniat et al. Cryptanalysis of a certificateless aggregate signature scheme
Zhou et al. Certificate-based generalized ring signcryption scheme
Zheng et al. Threshold attribute‐based signcryption and its application to authenticated key agreement
Gupta et al. A Novel Identity-based Deniable Authentication Protocol Using Bilinear Pairings for Mobile Ad Hoc Networks.
Tian et al. Cryptanalysis and improvement of a certificateless multi-proxy signature scheme
Shim Security vulnerabilities of four signature schemes from NTRU lattices and pairings
Le et al. Efficient certificate‐based encryption schemes without pairing
Ma et al. Certificateless group inside signature
Kumar et al. Insecurity of a secure certificate-based signature scheme
Islam et al. Design of an efficient ID-based short designated verifier proxy signature scheme
Kumar et al. A comment on efficient certificateless aggregate signature scheme
Xu et al. New Efficient Certificateless Aggregate Signature Scheme