TY - JOUR
T1 - On the security of a certificateless online/offline signcryption for Internet of Things
AU - Shi, Wenbo
AU - Kumar, Neeraj
AU - Gong, Peng
AU - Chilamkurti, Naveen
AU - Chang, Hangbae
N1 - Publisher Copyright:
© 2014, Springer Science+Business Media New York.
PY - 2015/9/7
Y1 - 2015/9/7
N2 - With the development of the Internet of Things (IOT) application, information security and user privacy protection in the IOT have attracted wide attention across the globe. To solve this problem, Luo et al. proposed an efficient certificateless online/offline signcryption (COOSC) scheme for IOT. They have also demonstrated that their scheme is provably in the random oracle model. However, in this paper, we will show their scheme is vulnerable to the private key compromised problem, i.e., an adversary could get a user’s private key through an intercepted message. The analysis show that Luo et al.’s scheme is not suitable for the IOT.
AB - With the development of the Internet of Things (IOT) application, information security and user privacy protection in the IOT have attracted wide attention across the globe. To solve this problem, Luo et al. proposed an efficient certificateless online/offline signcryption (COOSC) scheme for IOT. They have also demonstrated that their scheme is provably in the random oracle model. However, in this paper, we will show their scheme is vulnerable to the private key compromised problem, i.e., an adversary could get a user’s private key through an intercepted message. The analysis show that Luo et al.’s scheme is not suitable for the IOT.
KW - Bilinear pairing
KW - Certificateless cryptography
KW - Internet of Things
KW - Online/offline signcryption
UR - http://www.scopus.com/inward/record.url?scp=84938746527&partnerID=8YFLogxK
U2 - 10.1007/s12083-014-0249-3
DO - 10.1007/s12083-014-0249-3
M3 - Article
AN - SCOPUS:84938746527
SN - 1936-6442
VL - 8
SP - 881
EP - 885
JO - Peer-to-Peer Networking and Applications
JF - Peer-to-Peer Networking and Applications
IS - 5
ER -