http://iet.metastore.ingenta.com
1887

Improved certificate-based signature scheme without random oracles

Improved certificate-based signature scheme without random oracles

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Certificate-based cryptography is a useful primitive that combines traditional public key cryptography (PKC) and identity-based cryptography (IBC). It not only solves the key escrow problem inherent in IBC, but also simplifies the certificate problem in traditional PKC. So far, several certificate-based signature (CBS) schemes have been proposed in the literature. However, none of them consider the malicious certificate authority (CA) attack. Cryptanalysis shows that two previous CBS schemes without random oracles fail in achieving unforgeability under such attack. To overcome the security weakness in these schemes, the authors propose an improved CBS scheme that can withstand malicious CA attacks. They prove it to be existentially unforgeable against chosen message attacks under the computational Diffie–Hellman assumption in the standard model. Compared with the previous standard-model CBS schemes, the proposed scheme has obvious advantages in both the computation and communication efficiency.

References

    1. 1)
      • 1. Shamir, A.: ‘Identity-based cryptosystems and signature schemes’. Proc. CRYPTO 84, 1984 (LNCS, 196), pp. 4753.
    2. 2)
      • 2. Al-Riyami, S.S., Paterson, K.G.: ‘Certificateless public key cryptography’. Proc. ASIACRYPT 2003, 2003 (LNCS, 2894), pp. 452473.
    3. 3)
      • 3. Gentry, C.: ‘Certificate-based encryption and the certificate revocation problem’. Proc. EUROCRYPT 2003, 2003 (LNCS, 2656), pp. 272293.
    4. 4)
      • 4. Kang, B.G., Park, J.H., Hahn, S.G.: ‘A certificate-based signature scheme’. Proc. CT-RSA 2004, 2004 (LNCS, 2964), pp. 99111.
    5. 5)
      • 5. Au, M.H., Liu, J.K., Susilo, W., Yuen, T.H.: ‘Certificate based (linkable) ring signature’. Proc. ISPEC 2007, 2007 (LNCS, 4464), pp. 7992.
    6. 6)
      • 6. Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: ‘Certificate-based signature: security model and efficient construction’. Proc. EuroPKI 2007, 2007 (LNCS, 4582), pp. 110125.
    7. 7)
      • 7. Liu, J.K., Baek, J., Susilo, W., Zhou, J.: ‘Certificate based signature schemes without pairings or random oracles’. Proc. ISC 2008, 2008 (LNCS, 5222), pp. 285297.
    8. 8)
    9. 9)
      • 9. Zhang, J.: ‘On the security of a certificate-based signature scheme and its improvement with pairings’. Proc. ISPEC 2009, 2009 (LNCS, 5451), pp. 4758.
    10. 10)
      • 10. Liu, J.K., Baek, J., Zhou, J.: ‘Certificate-based sequential aggregate signature’. Proc. ACM WISEC 2009, 2009, pp. 2128.
    11. 11)
      • 11. Wu, W., Mu, Y., Susilo, W., Huang, X.Y.: ‘Certificate-based signatures, revisited’, J. Univers. Comput. Sci., 2009, 15, pp. 16591684.
    12. 12)
      • 12. Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: ‘Constructions of certificate-based signature secure against key replacement attacks’, J. Comput. Secur., 2010, 18, pp. 421449.
    13. 13)
    14. 14)
      • 14. Li, J., Zhang, Y., Teng, H.: ‘A forward-secure certificate-based signature scheme in the standard model’. Proc. CSS 2012, 2012 (LNCS, 7672), pp. 362376.
    15. 15)
    16. 16)
      • 16. Au, M.H., Chen, J., Liu, J.K., Mu, Y., Wong, D., Yang, G.: ‘Malicious KGC attacks in certificateless cryptography’. Proc. ACM ASIACCS 2007, 2007, pp. 302311.
    17. 17)
      • 17. Xiong, H., Qin, Z.G., Li, F.G.: ‘An improved certificateless signature scheme secure in the standard model’, Fundam. Inform., 2008, 88, pp. 193206.
    18. 18)
      • 18. Hwang, Y.H., Liu, J.K., Chow, S.S.M.: ‘Certificateless public key encryption secure against malicious KGC attacks in the standard model’, J. Univers. Comput. Sci., 2008, 14, pp. 463480.
    19. 19)
    20. 20)
    21. 21)
      • 21. Shen, L., Zhang, F., Li, S.: ‘Cryptanalysis of a certificateless encryption scheme in the standard model’. Proc. Fourth Int. Conf. on Intelligent Networking and Collaborative Systems, 2012, pp. 329333.
    22. 22)
    23. 23)
    24. 24)
      • 24. Waters, B.: ‘Efficient identity-based encryption without random oracles’. Proc. EUROCRYPT 2005, 2005 (LNCS, 3494), pp. 114127.
    25. 25)
      • 25. Bellare, M., Shoup, S.: ‘Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles’. Proc. PKC 2007, 2007 (LNCS, 4450), pp. 201216.
    26. 26)
      • 26. Kiltz, E., Vahlis, Y.: ‘CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption’. Proc. CT-RSA 2008, 2008 (LNCS, 4964), pp. 221238.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2015.0188
Loading

Related content

content/journals/10.1049/iet-ifs.2015.0188
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address