4.5 Article

Blockchain-enhanced certificateless signature scheme in the standard model

期刊

MATHEMATICAL BIOSCIENCES AND ENGINEERING
卷 20, 期 7, 页码 12718-12730

出版社

AMER INST MATHEMATICAL SCIENCES-AIMS
DOI: 10.3934/mbe.2023567

关键词

certificateless signature; forgery attack; random oracle model; blockchain; unforgeability

向作者/读者索取更多资源

The Internet of Things (IoT) is gradually entering our lives and promoting the transformation of society. Certificateless signature (CLS) is an effective method for verifying data in the IoT environment. However, most CLS schemes rely on ideal random oracles, which do not guarantee real-world security. In this paper, we analyze Shim's CLS scheme and demonstrate its vulnerability to public key replacement attacks. We propose a blockchain-based CLS scheme without a random oracle to improve security and prevent signature forgery.
The Internet of Things (IoT), driven by wireless communication and other technologies, is gradually entering our lives and promoting the transformation of society from informatization to intelligence. Certificateless signature (CLS) eliminates the characteristic of certificate management, making it an effective method for verifying large-scale data in the IoT environment. Nevertheless, hash functions are regarded as ideal random oracles in the security proofs of most CLS schemes, which cannot guarantee the security of CLS schemes in reality. In response to this problem, Shim devised a CLS scheme without random oracles in the standard model and declared it to be provably secure. Unfortunately, in this paper, we cryptanalyze Shim's CLS scheme and demonstrate that it is not resistant to public key replacement attacks from a Type I attacker. Furthermore, to further improve the security of the Shim CLS scheme and avoid the single-point failure of the KGC and the signature forgery initiated, we propose a blockchain-based CLS scheme without a random oracle. Finally, we evaluate the comprehensive performance, and while maintaining the computational and communication performance of the Shim scheme, we resist both Type I and Type II attackers, as well as signature forgery initiated against public parameters.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据