Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1770231.1770261guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Certificateless signature revisited

Published: 02 July 2007 Publication History

Abstract

In this paper we revisit the security models of certificateless signatures and propose two new constructions which are provably secure in the random oracle model. We divide the potential adversaries according to their attack power, and for the first time, three new kinds of adversaries are introduced into certificateless signatures. They are Normal Adversary, Strong Adversary and Super Adversary (ordered by their attack power). Combined with the known Type I Adversary and Type II Adversary in certificateless system, we then define the security of certificateless signatures in different attack scenarios. Our new models, together with the others in the literature, will enable us to better understand the security of certificateless signatures. Two concrete schemes with different security levels are also proposed in this paper. The first scheme, which is proved secure against Normal Type I and Super Type II Adversary, enjoys the shortest signature length among all the known certificateless signature schemes. The second scheme is secure against Super Type I and Type II adversary. Compared with the scheme in ACNS 2006 which has a similar security level, our second scheme requires lower operation cost but a little longer signature length.

References

[1]
Au, M.H., Chen, J., Liu, J.K., Mu, Y., Wong, D.S., Yang, G.: Malicious KGC Attacks in Certificateless Cryptography. In: ASIACCS (2007), also available at http://eprint.iacr.org/2006/255
[2]
Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452-473. Springer, Heidelberg (2003).
[3]
Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. Available online http://eprint.iacr.org/2003/126
[4]
Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. Journal of Cryptology 17, 297-319 (2004).
[5]
Cao, X., Paterson, K.G., Kou, W.: An Attack on a Certificateless Signature Scheme. In: Cryptology ePrint Archive. Available online http://eprint.iacr.org/2006/367
[6]
Dent, A.W.: A Survey of Certificateless Encryption Schemes and Security Models. In: Cryptology ePrint Archive. Available online: http://eprint.iacr.org/2006/211
[7]
Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory 22, 644-654 (1976).
[8]
Goldwasser, S., Micali, S., Rivest, R.: A Secure Digital Signature Scheme. SIAM Journal on Computing 17, 281-308 (1988).
[9]
Gorantla, M.C., Saxena, A.: An Efficient Certificateless Signature Scheme. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 110-116. Springer, Heidelberg (2005).
[10]
Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the Security of Certificateless Signature Schemes from Asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 13-25. Springer, Heidelberg (2005).
[11]
Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Key Replacement Attack Against a Generic Construction of Certificateless Signature. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 235-246. Springer, Heidelberg (2006).
[12]
Liu, J.K., Au, M.H., Susilo, W.: Self-Generated-Certificate Public Key Cryptography and Certificateless Signature/Encryption Scheme in the Standard Model. In: 2007 ACM Symposium on InformAtion, Computer and Communications Security - ASIACCS'07 (2007).
[13]
Li, X., Chen, K., Sun, L.: Certificateless Signature and Proxy Signature Schemes from Bilinear Pairings. Lithuanian Mathematical Journal 45, 76-83 (2005).
[14]
Park, Je. H.: An Attack on the Certificateless Signature Scheme from EUC Workshops 2006. In: Cryptology ePrint Archive. Available online: http://eprint.iacr.org/2006/442
[15]
Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology 13(3), 361-396 (2000).
[16]
Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985).
[17]
Yum, D.H., Lee, P.J.: Generic Construction of Certificateless Signature. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 200- 211. Springer, Heidelberg (2004).
[18]
Yap, W.-S., Heng, S.-H., Goi, B.-M.: An Efficient Certificateless Signature Scheme. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D., Jeong, Y.-S., Xu, C.-Z. (eds.) Emerging Directions in Embedded and Ubiquitous Computing. LNCS, vol. 4097, pp. 322-331. Springer, Heidelberg (2006).
[19]
Zhang, Z., Wong, D.: Certificateless Public-Key Signature: Security Model and Efficient Construction. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 293-308. Springer, Heidelberg (2006).
[20]
Zhang, Z., Feng, D.: Key Replacement Attack on a Certificateless Signature Scheme. In: Cryptology ePrint Archive. Available online http://eprint.iacr.org/2006/453

Cited By

View all
  • (2023)CL-SML: Secure Certificateless Signature with Message Linkages for IoT-Based Fog Computing EnvironmentsProceedings of the 2023 5th International Conference on Big-data Service and Intelligent Computation10.1145/3633624.3633626(9-15)Online publication date: 20-Oct-2023
  • (2019)A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of ThingsACM Transactions on Embedded Computing Systems10.1145/330130618:3(1-10)Online publication date: 5-Apr-2019
  • (2019)Privacy-Preserving Certificateless Cloud Auditing with Multiple UsersWireless Personal Communications: An International Journal10.1007/s11277-019-06208-1106:3(1161-1182)Online publication date: 1-Jun-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACISP'07: Proceedings of the 12th Australasian conference on Information security and privacy
July 2007
474 pages
ISBN:9783540734574
  • Editors:
  • Josef Pieprzyk,
  • Hossein Ghodosi,
  • Ed Dawson

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 02 July 2007

Author Tags

  1. certificateless cryptology
  2. random oracle
  3. security model
  4. signature

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)CL-SML: Secure Certificateless Signature with Message Linkages for IoT-Based Fog Computing EnvironmentsProceedings of the 2023 5th International Conference on Big-data Service and Intelligent Computation10.1145/3633624.3633626(9-15)Online publication date: 20-Oct-2023
  • (2019)A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of ThingsACM Transactions on Embedded Computing Systems10.1145/330130618:3(1-10)Online publication date: 5-Apr-2019
  • (2019)Privacy-Preserving Certificateless Cloud Auditing with Multiple UsersWireless Personal Communications: An International Journal10.1007/s11277-019-06208-1106:3(1161-1182)Online publication date: 1-Jun-2019
  • (2016)Cryptanalysis and Improvement of a Certificateless Short Signature Scheme using Bilinear PairingProceedings of the International Conference on Advances in Information Communication Technology & Computing10.1145/2979779.2979798(1-6)Online publication date: 12-Aug-2016
  • (2016)Fuzzy certificateless signatureSecurity and Communication Networks10.1002/sec.15729:16(3658-3669)Online publication date: 10-Nov-2016
  • (2016)Cryptanalysis of a certificateless aggregate signature schemeSecurity and Communication Networks10.1002/sec.14219:11(1353-1358)Online publication date: 25-Jul-2016
  • (2015)A new certificateless signature scheme under enhanced security modelsSecurity and Communication Networks10.5555/2914551.29145618:5(801-810)Online publication date: 25-Mar-2015
  • (2015)An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networksInformation Sciences: an International Journal10.1016/j.ins.2015.04.033317:C(48-66)Online publication date: 1-Oct-2015
  • (2015)Cryptanalysis of a certificateless identification schemeSecurity and Communication Networks10.1002/sec.9638:2(122-125)Online publication date: 25-Jan-2015
  • (2015)Design of provably secure and efficient certificateless blind signature scheme using bilinear pairingSecurity and Communication Networks10.1002/sec.13448:18(4319-4332)Online publication date: 1-Dec-2015
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media