A Provably-Secure Outsourced Revocable Certificateless Signature Scheme Without Bilinear Pairings

被引:11
|
作者
Du, Hongzhen [1 ]
Wen, Qiaoyan [2 ]
Zhang, Shanshan [1 ,3 ]
机构
[1] Baoji Univ Arts & Sci, Sch Math & Informat Sci, Baoji 721013, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Xidian Univ, Sch Telecommun Engn, Xian 710071, Shaanxi, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Certificateless signature; revocation; cloud server; elliptic curve discrete logarithm problem; ENCRYPTION SECURE; EFFICIENT; REVOCATION;
D O I
10.1109/ACCESS.2018.2880875
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless public key cryptosystem (CLPKC) is a desirable cryptographic system because it refrains from both certificate management and key escrow. In CLPKC, how to revoke a misbehaving or compromised user is an important issue. However, the existing revocable methods in CLPKC are impractical because of the use of either an expensive mediator or a burdensome key generation center (KGC). In order to overcome this drawback, we introduce outsourcing computation into CLPKC for the first time and design an outsourced revocable certificateless signature (ORCLS) scheme, and the revocation functionality is outsourced to a cloud server. The amount of computation needed to revoke a user is borne by the cloud server, which greatly reduces the burden on the KGC. In the rest of this paper, we formalize the definition and the security model for an ORCLS scheme and construct the first ORCLS scheme without bilinear pairings. It is proved that our scheme is existential unforgeable against adaptive chosen-message attacks from Type I, Type II, Type III, and Type IV adversaries under the elliptic curve discrete logarithm problem. Moreover, our scheme needs less computational cost and communication overhead and thus is more efficient than the other proposed revocable certificateless signature schemes so far.
引用
收藏
页码:73846 / 73855
页数:10
相关论文
共 50 条
  • [1] An efficient and provably-secure certificateless signature scheme without bilinear pairings
    He, D.
    Chen, J.
    Zhang, R.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (11) : 1432 - 1442
  • [2] Efficient and provably-secure certificateless short signature scheme from bilinear pairings
    Du, Hongzhen
    Wen, Qiaoyan
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 390 - 394
  • [3] Efficient and Provably-secure Certificateless Strong Designated Verifier Signature Scheme without Pairings
    Duan, Meijiao
    Zhu, Jianming
    Li, Yang
    [J]. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2018, 25 (06): : 1801 - 1809
  • [4] A Provably Secure Scalable Revocable Identity-Based Signature Scheme Without Bilinear Pairings
    Wang, Changji
    Huang, Hui
    Yuan, Yuan
    [J]. SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 588 - 597
  • [5] Efficient and provably-secure certificateless sequential aggregate signature scheme
    Wang, Zhu
    Yang, Siqi
    Li, Fenghua
    Geng, Kui
    Peng, Tingting
    Shi, Mengyao
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (05): : 58 - 67
  • [6] Efficient Certificateless Signature Scheme without Bilinear Pairings
    Ye, Junyao
    Wang, Yanhong
    Liu, Simin
    Wang, Yinglian
    Ye, Junyao
    [J]. 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION ENGINEERING (CSIE 2015), 2015, : 19 - 23
  • [7] An efficient certificateless signature scheme without bilinear pairings
    Kuo-Hui Yeh
    Kuo-Yu Tsai
    Chuan-Yen Fan
    [J]. Multimedia Tools and Applications, 2015, 74 : 6519 - 6530
  • [8] An efficient certificateless signature scheme without bilinear pairings
    Yeh, Kuo-Hui
    Tsai, Kuo-Yu
    Fan, Chuan-Yen
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (16) : 6519 - 6530
  • [9] Robust Certificateless Signature Scheme without Bilinear Pairings
    Yeh, Kuo-Hui
    Tsai, Kuo-Yu
    Kuo, Ren-Zong
    Wu, Tzong-Chen
    [J]. 2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
  • [10] A PROVABLY SECURE PROXY SIGNATURE SCHEME FROM BILINEAR PAIRINGS
    Wang Aiqin Li Jiguo Wang Zhijian (College of Computer & Information Engineering
    [J]. Journal of Electronics(China), 2010, 27 (03) : 298 - 304