{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T09:09:48Z","timestamp":1718701788339},"reference-count":22,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2020,8,5]],"date-time":"2020-08-05T00:00:00Z","timestamp":1596585600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,19]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Recently, Yang et al. proposed the first certificateless proxy signature scheme against malicious-but-passive key generation center (MKGC) attacks. They proved that their scheme can resist the MKGC attacks in the standard model. In this paper, we point out that their scheme cannot achieve this security because the adversary can forge valid signatures.<\/jats:p>","DOI":"10.1093\/comjnl\/bxaa105","type":"journal-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T19:09:14Z","timestamp":1594148954000},"page":"653-660","source":"Crossref","is-referenced-by-count":1,"title":["Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks"],"prefix":"10.1093","volume":"64","author":[{"given":"Xi-Jun","family":"Lin","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, 266100, Qingdao, P.R. China"}]},{"given":"Qihui","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, 266100, Qingdao, P.R. China"}]},{"given":"Lin","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Liberal Arts, Qingdao University, 266071, Qingdao, P.R. China"}]},{"given":"Zhen","family":"Yan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, 266100, Qingdao, P.R. China"}]},{"given":"Peishun","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, 266100, Qingdao, P.R. China"}]}],"member":"286","published-online":{"date-parts":[[2020,8,5]]},"reference":[{"key":"2021041913135074300_ref1","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1145\/1229285.1266997","article-title":"Malicious KGC Attacks in Certificateless Cryptography","volume-title":"Proc. 2nd ACM Symposium on Information, Computer and Communications Security\u2014ASIACCS\u201907","author":"Au","year":"2007"},{"key":"2021041913135074300_ref2","first-page":"92","article-title":"Certificateless proxy signature and proxy blind signature schemes","volume":"45","author":"Chen","year":"2009","journal-title":"Comput. Eng. Appl."},{"key":"2021041913135074300_ref3","article-title":"Short certificateless proxy signature scheme with provable security","volume-title":"International Conference on E-business & E-government","author":"Chen","year":"2010"},{"key":"2021041913135074300_ref4","doi-asserted-by":"crossref","first-page":"692","DOI":"10.3724\/SP.J.1001.2009.00574","article-title":"Certificateless proxy signature with provable security","volume":"20","author":"Chen","year":"2009","journal-title":"J. Softw."},{"key":"2021041913135074300_ref5","first-page":"437","article-title":"Certificateless Proxy Signature Scheme","volume-title":"Proc. 3rd Int. Conf. Multimedia, Information Technology and Its Applications MITA07","author":"Choi","year":"2007"},{"key":"2021041913135074300_ref6","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1142\/S0129054116500064","article-title":"Efficient certificateless proxy signature scheme","volume":"27","author":"Deng","year":"2016","journal-title":"Int. J. Found. Comput. Sci."},{"key":"2021041913135074300_ref7","first-page":"1","article-title":"Certificateless proxy signature from RSA","volume":"2014","author":"Deng","year":"2014","journal-title":"Math. Probl. Eng."},{"key":"2021041913135074300_ref8","first-page":"81","article-title":"A Certificateless Proxy Signature Scheme Secure in Standard Model","volume-title":"Proc. Int. Conf. Latest Computational Technologies ICLCT\u201912","author":"Eslami","year":"2012"},{"key":"2021041913135074300_ref9","doi-asserted-by":"crossref","first-page":"2510","DOI":"10.1016\/j.mcm.2012.12.037","article-title":"An efficient certificateless proxy signature scheme without pairing","volume":"57","author":"He","year":"2013","journal-title":"Math. Comput. Model."},{"key":"2021041913135074300_ref10","doi-asserted-by":"crossref","first-page":"3701","DOI":"10.1109\/TII.2018.2794991","article-title":"Provably secure and lightweight certificateless signature scheme for IIOT environments","volume":"14","author":"Karati","year":"2018","journal-title":"IEEE Trans. Ind. Informat."},{"key":"2021041913135074300_ref11","doi-asserted-by":"crossref","DOI":"10.1145\/1851476.1851513","article-title":"Authorization within grid-computing using certificateless identity-based proxy signature","volume-title":"ACM International Symposium on High Performance Distributed Computing","author":"Jabri","year":"2010"},{"key":"2021041913135074300_ref12","article-title":"Dealing With Grid-Computing Authorization Using Identity-Based Certificateless Proxy Signature. 2011","volume-title":"11th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing","author":"Jabri","year":"2011"},{"key":"2021041913135074300_ref13","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1007\/s10986-005-0008-5","article-title":"Certificateless signature and proxy signature schemes from bilinear pairings","volume":"45","author":"Li","year":"2005","journal-title":"Lith. Math. J."},{"key":"2021041913135074300_ref14","first-page":"285","article-title":"Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme From Bilinear Pairings","volume-title":"Proc. 8th ACIS Int. Conf. Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing SNPD \u201907","author":"Lu","year":"2007"},{"key":"2021041913135074300_ref15","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.tcs.2016.05.019","article-title":"Provably secure certificateless proxy signature scheme in the standard model","volume":"639","author":"Lu","year":"2016","journal-title":"Theor. Comput. Sci."},{"key":"2021041913135074300_ref16","doi-asserted-by":"crossref","first-page":"409","DOI":"10.3233\/FI-2018-1689","article-title":"Certificateless proxy signature scheme in the standard model","volume":"160","author":"Ming","year":"2018","journal-title":"Fundam. Inform."},{"key":"2021041913135074300_ref17","first-page":"346","volume-title":"ECDLP-Based Certificateless Proxy Signature Scheme With Message Recovery","author":"Padhye","year":"2015"},{"key":"2021041913135074300_ref18","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.ins.2011.11.005","article-title":"Efficient certificateless proxy signature scheme with provable security","volume":"188","author":"Seo","year":"2012","journal-title":"Inf. Sci."},{"key":"2021041913135074300_ref19","first-page":"1","article-title":"On the security of a certificateless proxy signature scheme with message recovery","volume":"2013","author":"Shi","year":"2013","journal-title":"Math. Probl. Eng."},{"key":"2021041913135074300_ref20","doi-asserted-by":"crossref","first-page":"277","DOI":"10.15388\/Informatica.2010.288","article-title":"A provably secure proxy signature scheme in certificateless cryptography","volume":"21","author":"Xiong","year":"2010","journal-title":"Informatica"},{"key":"2021041913135074300_ref21","first-page":"1","article-title":"A provably secure certificateless proxy signature scheme against malicious-but-passive KGC attacks","author":"Yang","year":"2019","journal-title":"Comput. J."},{"key":"2021041913135074300_ref22","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1016\/j.ins.2011.08.015","article-title":"Delegation of signing rights using certificateless proxy signatures","volume":"184","author":"Zhang","year":"2012","journal-title":"Inf. Sci."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/64\/4\/653\/37161771\/bxaa105.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/64\/4\/653\/37161771\/bxaa105.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T17:00:36Z","timestamp":1667322036000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/64\/4\/653\/5880730"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,5]]},"references-count":22,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2020,8,5]]},"published-print":{"date-parts":[[2021,4,19]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxaa105","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2021,4]]},"published":{"date-parts":[[2020,8,5]]}}}