z-logo
open-access-imgOpen Access
Cryptanalysis on Two Certificateless Signature Schemes
Author(s) -
Futai Zhang,
Sujuan Li,
Songqin Miao,
Yi Mu,
Willy Susilo,
Xinyi Huang
Publication year - 2010
Publication title -
international journal of computers communications and control
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.422
H-Index - 33
eISSN - 1841-9844
pISSN - 1841-9836
DOI - 10.15837/ijccc.2010.4.2517
Subject(s) - computer science , cryptanalysis , computer security , signature (topology) , cryptography , theoretical computer science , mathematics , geometry
Certificateless cryptography has attracted a lot of attention from the research community, due to its applicability in information security. In this paper, we analyze two recently proposed certificateless signature schemes and point out their security flaws. In particular, we demonstrate universal forgeries against these schemes with known message attacks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom