Skip to main content
Cryptanalysis on two certificateless signature schemes
Faculty of Informatics - Papers (Archive)
  • Futai Zhang, Nanjing Normal University
  • Sujuan Li, Nanjing Normal University
  • Songqin Miao, Nanjing Normal University
  • Yi Mu, University of Wollongong
  • Willy Susilo, University of Wollongong
  • Xinyi Huang, University of Wollongong
Publication Date
Publication Details

Zhang, F., Li, S., Miao, S., Mu, Y., Susilo, W. & Huang, X. (2010). Cryptanalysis on two certificateless signature schemes. International Journal of Computers, Communications and Control, 5 (4), 586-591.


Certificateless cryptography [1] is a new paradigm that not only removes the inherent key escrow problem of identity based public cryptography [2] (ID-PKC for short), but also eliminates the cumbersome certificate management in traditional PKI. In CL-PKC, the actual private key of a user is comprised of two secrets: a secret value and a partial private key. The user generates a secret value by himself, while the partial private key is generated by a third party called Key Generating Center (KGC), who makes use of a system wide master key and the user’s identity information. In this way, the key escrow problem in identity-based public key cryptosystems is removed. A user’s public key is derived from his/her actual private key, identity and system parameters. It could be available to other entities by transmitting along with signatures or by placing in a public directory. Unlike the traditional PKI, there is no certificate in certificateless public key cryptography to ensure the authenticity of the entity’s public key. A number of certificateless signature schemes [3–14] have been proposed. Some of them are analysed under reasonable security models with elaborate security proofs [8, 11, 13, 14], while some others are subsequently broken due to flawed security proof or unreasonable model [3, 6–8, 12].

Citation Information
Futai Zhang, Sujuan Li, Songqin Miao, Yi Mu, et al.. "Cryptanalysis on two certificateless signature schemes" (2010) p. 586 - 591
Available at: