dc.contributor | 資科系 | - |
dc.creator (作者) | Tso, Ray-Lin | - |
dc.creator (作者) | 左瑞麟 | zh_TW |
dc.creator (作者) | Chen, Y.-C. | en_US |
dc.creator (作者) | Horng, G. | en_US |
dc.date (日期) | 2013 | - |
dc.date.accessioned | 21-五月-2015 17:25:12 (UTC+8) | - |
dc.date.available | 21-五月-2015 17:25:12 (UTC+8) | - |
dc.date.issued (上傳時間) | 21-五月-2015 17:25:12 (UTC+8) | - |
dc.identifier.uri (URI) | http://nccur.lib.nccu.edu.tw/handle/140.119/75274 | - |
dc.description.abstract (摘要) | Certificateless public key cryptography, introduced by Al-Riyami and Paterson, simplifies the complex certificate management in PKI-based public key cryptography and solves the key escrow problem of identity-based cryptography. Huang et al. in 2007 showed security models of certificateless signature to simulate possible adversaries according to their attack abilities. Recently, Choi et al. proposed a certificateless short signature scheme. They claimed their scheme to be the only certificateless short signature scheme achieving the strongest security level presented by Huang et al.. They also give their security proofs to support their claim. However, we find that their scheme is not as secure as the authors claimed. In this paper, we give comments on the paper of Choi et al. including the cryptanalysis of their scheme and the weakness of the security proof. © 2013 Springer-Verlag Berlin Heidelberg. | - |
dc.format.extent | 176 bytes | - |
dc.format.mimetype | text/html | - |
dc.relation (關聯) | Smart Innovation, Systems and Technologies, 21, 61-68 | - |
dc.subject (關鍵詞) | Certificateless cryptographies; Certificateless signature; Cryptanalysis; Security model; Short signatures; Authentication; Intelligent systems; Public key cryptography; Security of data | - |
dc.title (題名) | Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme | - |
dc.type (資料類型) | article | en |
dc.identifier.doi (DOI) | 10.1007/978-3-642-35473-1_7 | - |
dc.doi.uri (DOI) | http://dx.doi.org/10.1007/978-3-642-35473-1_7 | - |