A New Certificateless Signature Scheme Provably Secure in the Standard Model

被引:24
|
作者
Shim, Kyung-Ah [1 ]
机构
[1] Natl Inst Math Sci, Div Integrated Math, Daejeon 305390, South Korea
来源
IEEE SYSTEMS JOURNAL | 2019年 / 13卷 / 02期
关键词
Bilinear pairing; certificateless signature (CLS); identity-based signature (IBS); random oracle model; standard model; KEY REPLACEMENT ATTACK; GENERIC CONSTRUCTION; EFFICIENT;
D O I
10.1109/JSYST.2018.2844809
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless cryptography eliminates the need of certificates from public-key cryptography and solves the key escrow problem in identity-based cryptography. Since Al-Riyami and Paterson introduced the concept of certificateless cryptography, there have been several proposals for certificateless encryption schemes and signature schemes provably secure in the random oracle model. In the random oracle paradigm, the schemes make use of cryptographic hash functions that are modeled as random oracles in the security proof. However, it has been shown that when random oracles are instantiated with concrete hash functions, the schemes may not be secure. Afterward, several certificateless signature (CLS) schemes provably secure without random oracles have been proposed. However, it turned out that all the schemes are insecure against type I or II adversaries. In this paper, we propose a new CLS scheme secure in the standard model under the computational Diffie-Hellman assumption. We then investigate the practical feasibility of our scheme.
引用
收藏
页码:1421 / 1430
页数:10
相关论文
共 50 条
  • [1] Provably secure certificateless proxy signature scheme in the standard model
    Lu, Yang
    Li, Jiguo
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 639 : 42 - 59
  • [2] Provably Secure Certificateless Proxy Signature Scheme in the Standard Model
    Deng, Lunzhi
    Hu, Zhenyu
    Ruan, Yu
    Wang, Tao
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (02): : 279 - 288
  • [3] Improved certificateless signature scheme provably secure in the standard model
    Yu, Y.
    Mu, Y.
    Wang, G.
    Xia, Q.
    Yang, B.
    [J]. IET INFORMATION SECURITY, 2012, 6 (02) : 102 - 110
  • [4] A New Provably Secure Certificateless Signature with Revocation in the Standard Model
    Mei, Qian
    Zhao, Yanan
    Xiong, Hu
    [J]. INFORMATICA, 2019, 30 (04) : 711 - 728
  • [5] A new provably secure certificateless signature scheme
    Zhang, Lei
    Zhang, Futai
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1685 - 1689
  • [6] A new provably secure certificateless short signature scheme
    Choi, Kyu Young
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 61 (07) : 1760 - 1768
  • [7] Provably secure certificateless encryption scheme in the standard model
    Deng, Lunzhi
    Xia, Tian
    He, Xiuru
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (06): : 2534 - 2553
  • [8] A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME
    Chen, Yu-Chi
    Liu, Chao-Liang
    Horng, Gwoboa
    Chen, Kuo-Chang
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (09): : 5557 - 5569
  • [9] A Provably Secure Certificateless Blind Signature Scheme
    Yang, Xiaoyuan
    Liang, Zhongyin
    Wei, Ping
    Shen, Junwei
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 643 - 646
  • [10] A new provably secure certificateless signature scheme for Internet of Things
    Du, Hongzhen
    Wen, Qiaoyan
    Zhang, Shanshan
    Gao, Mingchu
    [J]. AD HOC NETWORKS, 2020, 100