4.5 Article

Blockchain-enhanced certificateless signature scheme in the standard model

Journal

MATHEMATICAL BIOSCIENCES AND ENGINEERING
Volume 20, Issue 7, Pages 12718-12730

Publisher

AMER INST MATHEMATICAL SCIENCES-AIMS
DOI: 10.3934/mbe.2023567

Keywords

certificateless signature; forgery attack; random oracle model; blockchain; unforgeability

Ask authors/readers for more resources

The Internet of Things (IoT) is gradually entering our lives and promoting the transformation of society. Certificateless signature (CLS) is an effective method for verifying data in the IoT environment. However, most CLS schemes rely on ideal random oracles, which do not guarantee real-world security. In this paper, we analyze Shim's CLS scheme and demonstrate its vulnerability to public key replacement attacks. We propose a blockchain-based CLS scheme without a random oracle to improve security and prevent signature forgery.
The Internet of Things (IoT), driven by wireless communication and other technologies, is gradually entering our lives and promoting the transformation of society from informatization to intelligence. Certificateless signature (CLS) eliminates the characteristic of certificate management, making it an effective method for verifying large-scale data in the IoT environment. Nevertheless, hash functions are regarded as ideal random oracles in the security proofs of most CLS schemes, which cannot guarantee the security of CLS schemes in reality. In response to this problem, Shim devised a CLS scheme without random oracles in the standard model and declared it to be provably secure. Unfortunately, in this paper, we cryptanalyze Shim's CLS scheme and demonstrate that it is not resistant to public key replacement attacks from a Type I attacker. Furthermore, to further improve the security of the Shim CLS scheme and avoid the single-point failure of the KGC and the signature forgery initiated, we propose a blockchain-based CLS scheme without a random oracle. Finally, we evaluate the comprehensive performance, and while maintaining the computational and communication performance of the Shim scheme, we resist both Type I and Type II attackers, as well as signature forgery initiated against public parameters.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available