Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model

In this paper, we focus on security analysis of certificateless signature (CLS) schemes and certificateless threshold signature (CLTHS) schemes. We first propose four common attack methods for analyzing security of CLS schemes and CLTHS schemes. Then we give seven existing schemes as examples for demonstrating how to use our common attack methods, and prove that these schemes are vulnerable against public key replacement attacks or malicious-but-passive key generation center (KGC) attacks. By comprehensively using the proposed attack ideas, we also present three attacks against a CLTHS scheme proposed by Xiong et al. (2010) [28]: two public key replacement attacks and a malicious-but-passive KGC attack. Furthermore, we point out the flaws in the security proofs of these insecure CLS or CLTHS schemes. Finally, to resist these attacks, we propose an improved CLTHS scheme.

[1]  Dong Hoon Lee,et al.  Efficient Certificateless Signature Schemes , 2007, ACNS.

[2]  Serge Vaudenay,et al.  Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in ECDSA , 2004, ACISP.

[3]  Pil Joong Lee,et al.  Generic Construction of Certificateless Signature , 2004, ACISP.

[4]  Willy Susilo,et al.  Cryptanalysis on Two Certificateless Signature Schemes , 2010, Int. J. Comput. Commun. Control.

[5]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[6]  Xiaolei Dong,et al.  Efficient certificateless threshold signatures without random oracles , 2010, J. Syst. Sci. Complex..

[7]  Serge Vaudenay,et al.  The Security of DSA and ECDSA , 2003, Public Key Cryptography.

[8]  Yi Mu,et al.  Malicious KGC attacks in certificateless cryptography , 2007, ASIACCS '07.

[9]  Dong Hoon Lee,et al.  A new provably secure certificateless short signature scheme , 2011, Comput. Math. Appl..

[10]  Jianhong Zhang,et al.  Security Analysis of Two Signature Schemes and Their Improved Schemes , 2007, ICCSA.

[11]  Kenneth G. Paterson,et al.  An Attack on a Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..

[12]  Yi Mu,et al.  On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.

[13]  Fagen Li,et al.  An Improved Certificateless Signature Scheme Secure in the Standard Model , 2008, Fundam. Informaticae.

[14]  Ricardo Dahab,et al.  Two Notes on the Security of Certificateless Signatures , 2007, ProvSec.

[15]  Yi Mu,et al.  Certificateless threshold signature scheme from bilinear maps , 2010, Inf. Sci..

[16]  Yi Mu,et al.  Certificateless Signature Revisited , 2007, ACISP.

[17]  Qiaoyan Wen,et al.  Efficient and provably-secure certificateless short signature scheme from bilinear pairings , 2009, Comput. Stand. Interfaces.

[18]  Xiaotie Deng,et al.  Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.

[19]  Joseph K. Liu,et al.  Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.

[20]  Fagen Li,et al.  Certificateless threshold signature secure in the standard model , 2013, Inf. Sci..

[21]  Duncan S. Wong,et al.  Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.

[22]  Qiong Huang,et al.  Generic Certificateless Encryption in the Standard Model , 2007, IWSEC.

[23]  Bok-Min Goi,et al.  Cryptanalysis of Some Proxy Signature Schemes Without Certificates , 2007, WISTP.

[24]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[25]  Qiaoyan Wen,et al.  Certificateless multi-proxy signature , 2011, Comput. Commun..

[26]  Lei Zhang,et al.  A new certificateless aggregate signature scheme , 2009, Comput. Commun..

[27]  Zhenfu Cao,et al.  Simulatability and security of certificateless threshold signatures , 2007, Inf. Sci..

[28]  Robert H. Deng,et al.  Cryptanalysis of a certificateless signcryption scheme in the standard model , 2011, Inf. Sci..

[29]  Lei Zhang,et al.  Efficient many-to-one authentication with certificateless aggregate signatures , 2010, Comput. Networks.

[30]  Yi Mu,et al.  Certificateless Threshold Ring Signature , 2009, Inf. Sci..

[31]  Bok-Min Goi,et al.  An Efficient Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..

[32]  Kyung-Ah Shim,et al.  Breaking the short certificateless signature scheme , 2009, Inf. Sci..

[33]  Je Hong Park,et al.  Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006 , 2007, EUC Workshops.

[34]  Yupu Hu,et al.  Certificateless signcryption scheme in the standard model , 2010, Inf. Sci..

[35]  Kenneth G. Paterson,et al.  Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.

[36]  Shanshan Duan,et al.  Certificateless undeniable signature scheme , 2008, Inf. Sci..

[37]  Xiangxue Li,et al.  Certificateless signature and proxy signature schemes from bilinear pairings , 2005 .

[38]  Lei Zhang,et al.  A New Provably Secure Certificateless Signature Scheme , 2008, 2008 IEEE International Conference on Communications.

[39]  Xue Liu,et al.  McCLS: Certificateless Signature Scheme for Emergency Mobile Wireless Cyber-Physical Systems , 2008, Int. J. Comput. Commun. Control.