Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
392139 | Information Sciences | 2015 | 7 Pages |
Abstract
Certificateless cryptography eliminates the need of certificates in the Public Key Infrastructure and solves the inherent key escrow problem in the ID-based cryptography. In this paper, we point out security pitfalls on the restrictions of an adversary’s final output in security models of certificateless signature schemes by demonstrating key replacement attacks on three certificateless signature schemes in the different security models.
Related Topics
Physical Sciences and Engineering
Computer Science
Artificial Intelligence
Authors
Kyung-Ah Shim,