© The Institution of Engineering and Technology
Certificateless cryptography shares many features of identity-based cryptography and partially solves the problem of key escrow. Three certificateless signature schemes without random oracles were found in the literature. However, all the schemes suffer from some common drawbacks. First, by obtaining a signature on a message and replacing the public key of a signer, an adversary can forge valid signatures on the same message under the replaced public key. Secondly, all the schemes require a relatively large size of public parameters. The authors propose a new certificateless signature scheme, which exhibits an improvement on the existing schemes. Compared with the previous schemes, the proposed scheme offers stronger security, shorter system parameters and higher computational efficiency.
References
-
-
1)
-
Gorantla, M.C., Saxena, A.: `An efficient certificateless signature scheme', Proc. CIS 2005, p. 110–116, (LNCS, 3802).
-
2)
-
Al-Riyami, S.S., Paterson, K.G.: `Certificateless public key cryptography', Proc. Asiacrypt 2003, 2003, p. 452–473, (LNCS, 2849).
-
3)
-
Yum, D.H., Lee, P.J.: `Generic construction of certificateless signature', Proc. ACISP 2004, 2004, p. 200–211, (LNCS, 3108).
-
4)
-
Canetti, R., Goldreich, O., Halevi, S.: `The random oracle methodology, revisited', Proc. 30th Annual Symp. on Theory of Computing (STOC'98), 1998, p. 209–218.
-
5)
-
Liu, J.K., Au, M.H.: `Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model', Proc. 2007 ACM Symp. on Information, Computer and Communications Security-ASIACCS’2007, 2007, p. 273–283.
-
6)
-
X. Cao ,
K.G. Paterson ,
W. Kou
.
An attack on a certificateless signature scheme.
-
7)
-
Waters, B.: `Efficient identity based encryption without random oracles', Advances in Cryptology-EUROCRYPT 2005, 2005, p. 114–127, (LNCS, 3494).
-
8)
-
Bellare, M., Rogaway, P.: `Random oracles are practical: a paradigm for designing efficient protocols', First ACM Conf. on Computer and Communications Security, 1993, p. 62–72.
-
9)
-
Yuan, Y., Li, D., Tian, L., Zhu, H.: `Certificateless signature scheme without random oracles', Proc. ISA 2009, 2009, p. 31–40, (LNCS, 5576).
-
10)
-
Huang, X.Y., Susilo, W., Mu, Y., Zhang, F.T.: `On the security of certificateless signature schemes from Asiacrypt 2003', Proc. CANS 2005, 2005, p. 13–25, (LNCS, 3810).
-
11)
-
Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: `Key replacement attack against a generic construction of certificateless signature', Proc. ACISP 2006, 2006, p. 235–246, (LNCS, 4058).
-
12)
-
K. Shim
.
Breaking the short certificateless signature scheme.
Inf. Sci.
,
303 -
306
-
13)
-
Shamir, A.: `Identity-based cryptosystems and signature schemes', Proc. CRYPTO 84 on Advances in Cryptology, 1984, p. 47–53, (LNCS, 196).
-
14)
-
Paterson, K.G., Schuldt, J.C.N.: `Efficient identity-based signatures secure in the standard model', Proc. ACISP 2006, 2006, p. 207–222, (LNCS, 4058).
-
15)
-
Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: `Certificateless signature revisited', Proc. ACISP 2007, 2007, p. 308–322, (LNCS, 4586).
-
16)
-
Q. Xia ,
C.X. Xu ,
Y. Yu
.
Key replacement attack on two certificateless signature schemes without random oracles.
Key Eng. Mater.
,
1606 -
1611
-
17)
-
Au, M.H., Chen, J., Liu, J.K., Mu, Y., Wong, D.S., Yang, G.: `Malicious KGC attacks in certificateless cryptography', Proc. ASIACCS’07, 2007, p. 302–311.
-
18)
-
H. Xiong ,
Z. Qin ,
F. Li
.
An improved certificateless signature scheme secure in the standard model.
Fundamenta Informaticae
,
193 -
206
-
19)
-
Zhang, J., Mao, J.: `Security analysis of two signature schemes and their improved schemes', Proc. ICCSA 2007, 2007, p. 589–602, (LNCS, 4705, Part I).
-
20)
-
Boneh, D., Franklin, M.: `Identity-based encryption from the Weil pairings', Proc. Advances in Cryptology-Crypto 2001, 2001, p. 213–229, (LNCS, 3494).
-
21)
-
Lysyanskaya, A.: `Unique signatures and verifiable random functions from the DH-DDH separation', Proc. CRYPTO 2004, 2004, p. 597–612, (LNCS, 2442).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2011.0004
Related content
content/journals/10.1049/iet-ifs.2011.0004
pub_keyword,iet_inspecKeyword,pub_concept
6
6