Cryptanalysis of a lightweight certificateless signature scheme for IIOT environments
- Publication Type:
- Journal Article
- Citation:
- IEEE Access, 2018, 6 pp. 73885 - 73894
- Issue Date:
- 2018-01-01
Open Access
Copyright Clearance Process
- Recently Added
- In Progress
- Open Access
This item is open access.
© 2013 IEEE. As an extremely significant cryptographic primitive, certificateless signature (CLS) schemes can provide message authentication with no use of traditional digital certificates. High efficiency and provable security without random oracle are challensges in designing a CLS scheme. Recently, Karati et al. proposed an efficient pairing-based CLS scheme with no use of map-to-point hash function and random oracle model to provide data authenticity in Industrial Internet of Things (IIoT) systems. The security proof was given under several hardness assumptions. However, we notice that both public key replacement attack and known message attack are existing in Karati et al.'s scheme. Any adversary without knowledge of signer's private key is capable of forging valid signatures. This leads to several serious consequences. For example, anybody can sign IIoT data on behalf of IIoT data owner without being detected.
Please use this identifier to cite or link to this item: