A certificateless signature scheme with strong unforgeability in the random oracle model

被引:0
|
作者
Yang, Xia [1 ]
Sheng, Xing-Ping [1 ]
Zhang, Mian [1 ]
机构
[1] Fuyang Normal Univ, Sch Math & Stat, Fuyang, Anhui, Peoples R China
关键词
Certificateless signature; random oracle model; strong unforgeability; CDH assumption; CRH assumption;
D O I
10.3233/JCM-180823
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Certificateless public key cryptography (CL-PKC) was introduced to solve two important problems in public key cryptography. One was the presence of certificates in traditional public-key cryptography (TPKC), the other was the key escrow problem in ID-based public-key cryptography (ID-PKC). In recent years, several certificateless signature schemes (CLS) have been proposed in the random oracle model (ROM) and the standard model. However, many implementations of the random oracle may result in insecure schemes. Some CLS schemes in the standard model were insecure against key replacement attack and were not strongly unforgeable. In order to solve these problems, we construct a CLS scheme in the ROM in this paper. Based on the Computational Diffie-Hellman (CDH) assumption and collision-resistant hash (CRH) assumption and partially depending on the ROM, we prove that the scheme has strong unforgeability. In addition, we show that the proposed scheme enjoys higher computational efficiency.
引用
收藏
页码:715 / 724
页数:10
相关论文
共 50 条
  • [31] On Random-Oracle-Free Top-Level Secure Certificateless Signature Schemes
    Rastegari, Parvin
    Susilo, Willy
    COMPUTER JOURNAL, 2022, 65 (12): : 3049 - 3061
  • [32] Certificateless strong key-insulated signature without random oracles
    Wan Z.-M.
    Meng X.-Q.
    Hong X.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 571 - 576
  • [33] On the security of a certificateless proxy signature scheme in the standard model
    Zhou, Caixue
    Dong, Xiwei
    Wang, Lihua
    Li, Tao
    International Journal of Network Security, 2019, 21 (04) : 576 - 581
  • [34] Certificateless blind signature scheme
    Su, Wan-Li
    Zhang, Yue-Yu
    Zhang, Xiao-Hong
    Wang, Yu-Min
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (04): : 533 - 536
  • [35] On the security of a Certificateless Signature Scheme
    Cheng, Lin
    Wen, Qiao Yan
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 965 - 968
  • [36] Certificateless Directed Signature Scheme
    Wan, Zhongmei
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [37] An efficient certificateless signature scheme
    Yap, Wun-She
    Heng, Swee-Huay
    Goi, Bok-Min
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 322 - 331
  • [38] Certificateless undeniable signature scheme
    Duan, Shanshan
    INFORMATION SCIENCES, 2008, 178 (03) : 742 - 755
  • [39] An efficient certificateless signature scheme
    Su, Wanli
    Li, Hui
    Zhang, Yueyu
    Wang, Yumin
    Jiangsu Daxue Xuebao (Ziran Kexue Ban) / Journal of Jiangsu University (Natural Science Edition), 2009, 30 (04): : 401 - 404
  • [40] An efficient certificateless signature scheme
    Gorantla, MC
    Saxena, A
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 110 - 116