Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Improved certificateless signature scheme provably secure in the standard model

Improved certificateless signature scheme provably secure in the standard model

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Certificateless cryptography shares many features of identity-based cryptography and partially solves the problem of key escrow. Three certificateless signature schemes without random oracles were found in the literature. However, all the schemes suffer from some common drawbacks. First, by obtaining a signature on a message and replacing the public key of a signer, an adversary can forge valid signatures on the same message under the replaced public key. Secondly, all the schemes require a relatively large size of public parameters. The authors propose a new certificateless signature scheme, which exhibits an improvement on the existing schemes. Compared with the previous schemes, the proposed scheme offers stronger security, shorter system parameters and higher computational efficiency.

References

    1. 1)
      • Gorantla, M.C., Saxena, A.: `An efficient certificateless signature scheme', Proc. CIS 2005, p. 110–116, (LNCS, 3802).
    2. 2)
      • Al-Riyami, S.S., Paterson, K.G.: `Certificateless public key cryptography', Proc. Asiacrypt 2003, 2003, p. 452–473, (LNCS, 2849).
    3. 3)
      • Yum, D.H., Lee, P.J.: `Generic construction of certificateless signature', Proc. ACISP 2004, 2004, p. 200–211, (LNCS, 3108).
    4. 4)
      • Canetti, R., Goldreich, O., Halevi, S.: `The random oracle methodology, revisited', Proc. 30th Annual Symp. on Theory of Computing (STOC'98), 1998, p. 209–218.
    5. 5)
      • Liu, J.K., Au, M.H.: `Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model', Proc. 2007 ACM Symp. on Information, Computer and Communications Security-ASIACCS’2007, 2007, p. 273–283.
    6. 6)
      • X. Cao , K.G. Paterson , W. Kou . An attack on a certificateless signature scheme.
    7. 7)
      • Waters, B.: `Efficient identity based encryption without random oracles', Advances in Cryptology-EUROCRYPT 2005, 2005, p. 114–127, (LNCS, 3494).
    8. 8)
      • Bellare, M., Rogaway, P.: `Random oracles are practical: a paradigm for designing efficient protocols', First ACM Conf. on Computer and Communications Security, 1993, p. 62–72.
    9. 9)
      • Yuan, Y., Li, D., Tian, L., Zhu, H.: `Certificateless signature scheme without random oracles', Proc. ISA 2009, 2009, p. 31–40, (LNCS, 5576).
    10. 10)
      • Huang, X.Y., Susilo, W., Mu, Y., Zhang, F.T.: `On the security of certificateless signature schemes from Asiacrypt 2003', Proc. CANS 2005, 2005, p. 13–25, (LNCS, 3810).
    11. 11)
      • Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: `Key replacement attack against a generic construction of certificateless signature', Proc. ACISP 2006, 2006, p. 235–246, (LNCS, 4058).
    12. 12)
    13. 13)
      • Shamir, A.: `Identity-based cryptosystems and signature schemes', Proc. CRYPTO 84 on Advances in Cryptology, 1984, p. 47–53, (LNCS, 196).
    14. 14)
      • Paterson, K.G., Schuldt, J.C.N.: `Efficient identity-based signatures secure in the standard model', Proc. ACISP 2006, 2006, p. 207–222, (LNCS, 4058).
    15. 15)
      • Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: `Certificateless signature revisited', Proc. ACISP 2007, 2007, p. 308–322, (LNCS, 4586).
    16. 16)
    17. 17)
      • Au, M.H., Chen, J., Liu, J.K., Mu, Y., Wong, D.S., Yang, G.: `Malicious KGC attacks in certificateless cryptography', Proc. ASIACCS’07, 2007, p. 302–311.
    18. 18)
      • H. Xiong , Z. Qin , F. Li . An improved certificateless signature scheme secure in the standard model. Fundamenta Informaticae , 193 - 206
    19. 19)
      • Zhang, J., Mao, J.: `Security analysis of two signature schemes and their improved schemes', Proc. ICCSA 2007, 2007, p. 589–602, (LNCS, 4705, Part I).
    20. 20)
      • Boneh, D., Franklin, M.: `Identity-based encryption from the Weil pairings', Proc. Advances in Cryptology-Crypto 2001, 2001, p. 213–229, (LNCS, 3494).
    21. 21)
      • Lysyanskaya, A.: `Unique signatures and verifiable random functions from the DH-DDH separation', Proc. CRYPTO 2004, 2004, p. 597–612, (LNCS, 2442).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2011.0004
Loading

Related content

content/journals/10.1049/iet-ifs.2011.0004
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address