Your browser doesn't support javascript.
loading
Blockchain-enhanced certificateless signature scheme in the standard model.
Yang, Xiaodong; Wen, Haoqi; Liu, Lei; Ren, Ningning; Wang, Caifen.
Afiliación
  • Yang X; College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China.
  • Wen H; College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China.
  • Liu L; China Telecom WanWei Information Technology Co., LTD, Lanzhou 730030, China.
  • Ren N; College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China.
  • Wang C; Department of Big Data and Internet, Shenzhen Technology University, Shenzhen 518118, China.
Math Biosci Eng ; 20(7): 12718-12730, 2023 May 31.
Article en En | MEDLINE | ID: mdl-37501463
ABSTRACT
The Internet of Things (IoT), driven by wireless communication and other technologies, is gradually entering our lives and promoting the transformation of society from "informatization" to "intelligence". Certificateless signature (CLS) eliminates the characteristic of certificate management, making it an effective method for verifying large-scale data in the IoT environment. Nevertheless, hash functions are regarded as ideal random oracles in the security proofs of most CLS schemes, which cannot guarantee the security of CLS schemes in reality. In response to this problem, Shim devised a CLS scheme without random oracles in the standard model and declared it to be provably secure. Unfortunately, in this paper, we cryptanalyze Shim's CLS scheme and demonstrate that it is not resistant to public key replacement attacks from a Type Ⅰ attacker. Furthermore, to further improve the security of the Shim CLS scheme and avoid the single-point failure of the KGC and the signature forgery initiated, we propose a blockchain-based CLS scheme without a random oracle. Finally, we evaluate the comprehensive performance, and while maintaining the computational and communication performance of the Shim scheme, we resist both Type Ⅰ and Type Ⅱ attackers, as well as signature forgery initiated against public parameters.
Palabras clave

Texto completo: 1 Colección: 01-internacional Base de datos: MEDLINE Tipo de estudio: Prognostic_studies Idioma: En Revista: Math Biosci Eng Año: 2023 Tipo del documento: Article País de afiliación: China

Texto completo: 1 Colección: 01-internacional Base de datos: MEDLINE Tipo de estudio: Prognostic_studies Idioma: En Revista: Math Biosci Eng Año: 2023 Tipo del documento: Article País de afiliación: China
...