- 저자Kyung-Ah Shim
-
학술지Information Sciences 300, 63-69
- 등재유형
- 게재일자(2015)
Certificateless cryptography eliminates the need of certificates in the Public Key Infrastructure
and solves the inherent key escrow problem in the ID-based cryptography. In this paper,
we point out security pitfalls on the restrictions of an adversary’s final output in security
models of certificateless signature schemes by demonstrating key replacement attacks on
three certificateless signature schemes in the different security models.
Certificateless cryptography eliminates the need of certificates in the Public Key Infrastructure
and solves the inherent key escrow problem in the ID-based cryptography. In this paper,
we point out security pitfalls on the restrictions of an adversary’s final output in security
models of certificateless signature schemes by demonstrating key replacement attacks on
three certificateless signature schemes in the different security models.