Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Identity-Based and Self-Certified Key-Exchange Protocols
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
Key Distribution Systems Based on Identification Information
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Security proofs for signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
CBE from CL-PKE: a generic construction and efficient schemes
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Certificateless public key encryption without pairing
ISC'05 Proceedings of the 8th international conference on Information Security
Certificateless signature: a new security model and an improved generic construction
Designs, Codes and Cryptography
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Malicious KGC attacks in certificateless cryptography
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Certificateless threshold cryptosystem secure against chosen-ciphertext attack
Information Sciences: an International Journal
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Efficient Certificateless Signature Schemes
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Security Mediated Certificateless Signatures
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Breaking the short certificateless signature scheme
Information Sciences: an International Journal
Efficient and Short Certificateless Signature
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
An Improved Certificateless Signature Scheme Secure in the Standard Model
Fundamenta Informaticae
A new certificateless aggregate signature scheme
Computer Communications
Information Security Applications
Novel Efficient Certificateless Aggregate Signatures
AAECC-18 '09 Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Certificateless Signature Scheme without Random Oracles
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Certificateless Threshold Ring Signature
Information Sciences: an International Journal
Certificateless signcryption scheme in the standard model
Information Sciences: an International Journal
A certificateless-based Key distribution scheme with multi-KGCs in P2P networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Cryptanalysis of some proxy signature schemes without certificates
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Generic certificateless key encapsulation mechanism
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Certificateless signature revisited
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Generic certificateless encryption in the standard model
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Two notes on the security of certificateless signatures
ProvSec'07 Proceedings of the 1st international conference on Provable security
A provably secure ring signature scheme in certificateless cryptography
ProvSec'07 Proceedings of the 1st international conference on Provable security
Security analysis of the certificateless signature scheme proposed at SecUbiq 2006
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
New efficient certificateless signature scheme
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Certificateless encryption schemes strongly secure in the standard model
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Security analysis of two signature schemes and their improved schemes
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Constructions of certificate-based signature secure against key replacement attacks
Journal of Computer Security - The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)
Efficient many-to-one authentication with certificateless aggregate signatures
Computer Networks: The International Journal of Computer and Telecommunications Networking
Certificateless threshold signature scheme from bilinear maps
Information Sciences: an International Journal
Cryptanalysis of a certificateless signcryption scheme in the standard model
Information Sciences: an International Journal
Efficient and short certificateless signatures secure against realistic adversaries
The Journal of Supercomputing
Journal of Computer Science and Technology
Self-generated-certificate public key encryption without pairing and its application
Information Sciences: an International Journal
A new provably secure certificateless short signature scheme
Computers & Mathematics with Applications
Self-certified ring signatures
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Provably-secure electronic cash based on certificateless partially-blind signatures
Electronic Commerce Research and Applications
Delegation of signing rights using certificateless proxy signatures
Information Sciences: an International Journal
An efficient short certificate-based signature scheme
Journal of Systems and Software
Efficient certificateless proxy signature scheme with provable security
Information Sciences: an International Journal
An efficient certificateless signature scheme
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
An efficient RSA-based certificateless signature scheme
Journal of Systems and Software
Security-Mediated certificateless cryptography
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Certificateless public-key signature: security model and efficient construction
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Key replacement attack against a generic construction of certificateless signature
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Strongly secure certificateless short signatures
Journal of Systems and Software
Certificateless undeniable signatures from bilinear maps
Information Sciences: an International Journal
Securing wireless mesh networks in a unified security framework with corruption-resilience
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security Pitfalls of the Certificateless Signature and Multi-Receiver Signcryption Schemes
Fundamenta Informaticae
An Improved Certificateless Signature Scheme Secure in the Standard Model
Fundamenta Informaticae
An efficient certificateless aggregate signature with constant pairing computations
Information Sciences: an International Journal
Certificate-based signature: security model and efficient construction
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Practical certificateless public key encryption in the standard model
NSS'12 Proceedings of the 6th international conference on Network and System Security
Provably secure certificate-based signature scheme without pairings
Information Sciences: an International Journal
Certificateless threshold signature secure in the standard model
Information Sciences: an International Journal
Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
Information Sciences: an International Journal
Hi-index | 0.00 |
In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced. In the new paradigm, the necessity of certificates has been successfully removed. The security model for certificateless cryptography was also introduced in the same paper. However, as we shall show in this paper, the proposed certificateless signature is insecure in their defined model. We provide an attack that can successfully forge a certificateless signature in their model. We also fix this problem by proposing a new scheme.