Abstract
With the development of the Internet of Things (IOT) application, information security and user privacy protection in the IOT have attracted wide attention across the globe. To solve this problem, Luo et al. proposed an efficient certificateless online/offline signcryption (COOSC) scheme for IOT. They have also demonstrated that their scheme is provably in the random oracle model. However, in this paper, we will show their scheme is vulnerable to the private key compromised problem, i.e., an adversary could get a user’s private key through an intercepted message. The analysis show that Luo et al.’s scheme is not suitable for the IOT.
| Original language | English |
|---|---|
| Pages (from-to) | 881-885 |
| Number of pages | 5 |
| Journal | Peer-to-Peer Networking and Applications |
| Volume | 8 |
| Issue number | 5 |
| DOIs | |
| Publication status | Published - 7 Sept 2015 |
Keywords
- Bilinear pairing
- Certificateless cryptography
- Internet of Things
- Online/offline signcryption