- Research Fields수리모델연구부
- AuthorKyung-Ah Shim
-
JournalInformation Sciences 300, 63-69 (2015
- Classification of papersSCI
Certificateless cryptography eliminates the need of certificates in the Public Key Infrastructure
and solves the inherent key escrow problem in the ID-based cryptography. In this paper,
we point out security pitfalls on the restrictions of an adversary’s final output in security
models of certificateless signature schemes by demonstrating key replacement attacks on
three certificateless signature schemes in the different security models.
Certificateless cryptography eliminates the need of certificates in the Public Key Infrastructure
and solves the inherent key escrow problem in the ID-based cryptography. In this paper,
we point out security pitfalls on the restrictions of an adversary’s final output in security
models of certificateless signature schemes by demonstrating key replacement attacks on
three certificateless signature schemes in the different security models.