Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments - MaRDI portal

Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments (Q2234800)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments
scientific article

    Statements

    Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    19 October 2021
    0 references
    The paper presents an attack on the pairing-free certificate-based proxy signature scheme proposed by \textit{G. K. Verma} et al. [``Short certificate-based proxy signature scheme from pairings'', Trans. Emerg. Telecommun. Technol. 28, No. 12, Article ID e3214, 15 p. (2017; \url{doi:10.1002/ett.3214})]. After discussing the motivation and related work on certificated-based signature schemes as-well as recalling the scheme presented by Verma et al., the authors show that the scheme is not secure against a signature forgery attack performed by a malicious proxy signer under standard cryptographic assumptions (ECDLP) in the random oracle model. The paper is clear, and the arguments are easy to follow as they rely on algebraic calculation. But the description of the certificate-based certification algorithm contains a minor error. The (trivial) classification of adversaries into six types instead of two is helpful to specify the concrete adversary. The authors' observation that an adversary can use the algebraic relations used in the protocol to calculate a forged signature is interesting. Moreover, the authors present a modified protocol fixing the vulnerability.
    0 references
    0 references
    0 references
    industrial Internet of things
    0 references
    certificate-based signature
    0 references
    proxy
    0 references
    pairing-free
    0 references
    0 references
    0 references
    0 references