An efficient certificateless signature from pairings

被引:1
|
作者
Wang, Changji [1 ]
Huang, Hui [2 ]
Tang, Yong [1 ]
机构
[1] Sun Yat Sen Univ, Dept Comp Sci, Guangzhou 510275, Guangdong, Peoples R China
[2] Guangdong Univ Business Stud, Dept Math, Guangzhou 510230, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/ISDPE.2007.15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we proposed anew certificateless signature based on bilinear pairings. The proposed scheme is more efficient than those of previous schemes by pre-computing the pairing e(P, P) = g and publishing as the system parameters, it needs not to compute the pairing in the Sign stage, and only needs to compute three pairings in the Verify stage. In addition, the proposed scheme does not need the special MaptoPoint hash function and the confidential channel between KGC and users. The proposed scheme is unforgeable under the hardness assumption of the q-strong Diffie-Hellman problem and Computational Diffie-Hellman problem.
引用
收藏
页码:236 / +
页数:2
相关论文
共 50 条
  • [31] An efficient ring signature scheme from pairings
    Shim, Kyung-Ah
    [J]. INFORMATION SCIENCES, 2015, 300 : 63 - 69
  • [32] A Novel Certificateless Aggregate Signature Scheme without Bilinear Pairings
    Tian, Xiao
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGY (CNCT 2016), 2016, 54 : 853 - 857
  • [33] Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings
    Fan, Chun-I
    Hsu, Ruei-Hau
    Ho, Pei-Hsiu
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (03) : 969 - 982
  • [34] Efficient and Short Certificateless Signature
    Tso, Raylin
    Yi, Xun
    Huang, Xinyi
    [J]. CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 64 - +
  • [35] Efficient certificateless signature schemes
    Choi, Kyu Young
    Park, Jong Hwan
    Hwang, Jung Yeon
    Lee, Dong Hoon
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 443 - +
  • [36] An efficient certificateless signature scheme
    Yap, Wun-She
    Heng, Swee-Huay
    Goi, Bok-Min
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 322 - 331
  • [37] An efficient certificateless signature scheme
    Su, Wanli
    Li, Hui
    Zhang, Yueyu
    Wang, Yumin
    [J]. Jiangsu Daxue Xuebao (Ziran Kexue Ban) / Journal of Jiangsu University (Natural Science Edition), 2009, 30 (04): : 401 - 404
  • [38] An efficient certificateless signature scheme
    Gorantla, MC
    Saxena, A
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 110 - 116
  • [39] On constructing certificateless proxy signature from certificateless signature
    Wan Z.-M.
    Lai X.-J.
    Weng J.
    Hong X.
    Long Y.
    Jia W.-W.
    [J]. Journal of Shanghai Jiaotong University (Science), 2008, 13 E (06) : 692 - 694
  • [40] An Efficient Certificateless Threshold Decryption Schemes Based On Pairings
    Li, Fei
    Gao, Wei
    Wang, Yilei
    Wang, Xueli
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (12) : 2987 - 2996