Efficient and short certificateless signatures secure against realistic adversaries

被引:0
|
作者
Raylin Tso
Xun Yi
Xinyi Huang
机构
[1] National Chengchi University,Department of Computer Science
[2] Victoria University,School of Computer Science and Mathematics
[3] Singapore Management University,School of Information Systems
来源
关键词
Bilinear pairing; Certificateless signature; Cryptographic protocol; Digital signature; Random oracle model; Short signature;
D O I
暂无
中图分类号
学科分类号
摘要
The notion of certificateless cryptography is aimed to eliminate the use of certificates in traditional public key cryptography and also to solve the key-escrow problem in identity-based cryptography. Many kinds of security models have been designed for certificateless cryptography and many new schemes have been introduced based on the correspondence of the security models. In generally speaking, a stronger security model can ensure a certificateless cryptosystem with a higher security level, but a realistic model can lead to a more efficient scheme. In this paper, we focus on the efficiency of a certificateless signature (CLS) scheme and introduce an efficient CLS scheme with short signature size. On one hand, the security of the scheme is based on a realistic model. In this model, an adversary is not allowed to get any valid signature under false public keys. On the other hand, our scheme is as efficient as BLS short signature scheme in both communication and computation and, therefore, turns out to be more efficient than other CLS schemes proposed so far. We provide a rigorous security proof of our scheme in the random oracle model. The security of our scheme is based on the k-CAA hard problem and a new discovered hard problem, namely the modified k-CAA problem. Our scheme can be applied to systems where signatures are typed in by human or systems with low-bandwidth channels and/or low-computation power.
引用
收藏
页码:173 / 191
页数:18
相关论文
共 50 条
  • [1] Efficient and short certificateless signatures secure against realistic adversaries
    Tso, Raylin
    Yi, Xun
    Huang, Xinyi
    [J]. JOURNAL OF SUPERCOMPUTING, 2011, 55 (02): : 173 - 191
  • [2] Strongly secure certificateless short signatures
    Tso, Raylin
    Huang, Xinyi
    Susilo, Willy
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (06) : 1409 - 1417
  • [3] Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
    Aumann, Yonatan
    Lindell, Yehuda
    [J]. JOURNAL OF CRYPTOLOGY, 2010, 23 (02) : 281 - 343
  • [4] Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
    Yonatan Aumann
    Yehuda Lindell
    [J]. Journal of Cryptology, 2010, 23 : 281 - 343
  • [5] Security against covert adversaries: Efficient protocols for realistic adversaries
    Aumann, Yonatan
    Lindell, Yehuda
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2007, 4392 : 137 - +
  • [6] On the Existence of Short Certificateless Signatures
    Shim, Kyung-Ah
    Lee, Young-Ran
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (06): : 847 - 852
  • [7] Data Publishing against Realistic Adversaries
    Machanavajjhala, Ashwin
    Gehrke, Johannes
    Goetz, Michaela
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2009, 2 (01): : 790 - 801
  • [8] Efficient Byzantine agreement secure against general adversaries - (Extended abstract)
    Fitzi, M
    Maurer, U
    [J]. DISTRIBUTED COMPUTING, 1998, 1499 : 134 - 148
  • [9] Novel Efficient Certificateless Aggregate Signatures
    Zhang, Lei
    Qin, Bo
    Wu, Qianhong
    Zhang, Futai
    [J]. APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS, AND ERROR-CORRECTING CODES, 2009, 5527 : 235 - +
  • [10] Efficient certificateless designated verifier signatures and proxy signatures
    Hongzhen, Du
    Qiaoyan, Wen
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (01) : 95 - 100