A new provably secure certificateless short signature scheme

被引:69
|
作者
Choi, Kyu Young [1 ]
Park, Jong Hwan [2 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, CIST, Seoul 136701, South Korea
[2] Kyung Hee Univ, Coll Appl Sci, Dept Appl Math, Youngin Si 446701, Gyeonggi Do, South Korea
关键词
Certificateless signature; Short signature; Bilinear maps; GENERIC CONSTRUCTION; RANDOM ORACLES; EFFICIENT;
D O I
10.1016/j.camwa.2011.02.003
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography. In 2007, Huang et al. revisited the security models of certificateless signature scheme. They classified adversaries according to their attack power into normal, strong, and super adversaries (ordered by their attack power). Recently, Du and Wen proposed a short certificateless signature scheme and presented that their scheme is secure against the strong adversary in the random oracle model. In this paper, we show that their short signature scheme is insecure against the strong adversary. We then propose a new short certificateless signature scheme which is secure against the super adversary. Our scheme is the first certificateless signature scheme which satisfies both the strongest security level and the shortest signature length. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1760 / 1768
页数:9
相关论文
共 50 条
  • [1] A new provably secure certificateless signature scheme
    Zhang, Lei
    Zhang, Futai
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1685 - 1689
  • [2] Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme
    Chen, Y.-C. (s9756034@cs.nchu.edu.tw), 2013, Springer Science and Business Media Deutschland GmbH (21):
  • [3] A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME
    Chen, Yu-Chi
    Liu, Chao-Liang
    Horng, Gwoboa
    Chen, Kuo-Chang
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (09): : 5557 - 5569
  • [4] Provably secure certificateless digital signature scheme
    Wang, Hua-Qun
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 76 - 78
  • [5] A New Certificateless Signature Scheme Provably Secure in the Standard Model
    Shim, Kyung-Ah
    IEEE SYSTEMS JOURNAL, 2019, 13 (02): : 1421 - 1430
  • [6] A new provably secure certificateless signature scheme for Internet of Things
    Du, Hongzhen
    Wen, Qiaoyan
    Zhang, Shanshan
    Gao, Mingchu
    AD HOC NETWORKS, 2020, 100
  • [7] A new provably secure certificateless signature scheme for Internet of Things
    Du, Hongzhen
    Wen, Qiaoyan
    Zhang, Shanshan
    Gao, Mingchu
    Ad Hoc Networks, 2020, 100
  • [8] A Provably Secure Certificateless Blind Signature Scheme
    Yang, Xiaoyuan
    Liang, Zhongyin
    Wei, Ping
    Shen, Junwei
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 643 - 646
  • [9] Provably Secure Forward Secure Certificateless Proxy Signature Scheme
    Li, Jiguo
    Li, Yanqiong
    Zhang, Yichen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (08): : 1972 - 1988
  • [10] A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
    Xiong, Hu
    Li, Fagen
    Qin, Zhiguang
    INFORMATICA, 2010, 21 (02) : 277 - 294