Design of DL-based certificateless digital signatures

被引:16
|
作者
Harn, Lein [2 ]
Ren, Jian [1 ]
Lin, Changlu [3 ,4 ]
机构
[1] Michigan State Univ, Dept Elect & Comp Engn, E Lansing, MI 48864 USA
[2] Univ Missouri, Dept Comp Sci & Elect Engn, Kansas City, MO 64110 USA
[3] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[4] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Fuzhou 350007, Fujian, Peoples R China
基金
美国国家科学基金会;
关键词
ID-based cryptosystem; ID-based signature; Provable security; Key escrow; Certificateless digital signature; IDENTITY-BASED SIGNATURE; GENERIC CONSTRUCTION; SECURITY PROOFS; DIFFIE-HELLMAN; SCHEME; EFFICIENT; PAIRINGS; MODEL;
D O I
10.1016/j.jss.2008.11.844
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Public-key cryptosystems without requiring digital certificates are very attractive in wireless communications due to limitations imposed by Communication bandwidth and computational resource of the mobile wireless communication devices. To eliminate public-key digital certificate, Shamir introduced the concept of the identity-based (ID-based) cryptosystem. The main advantage of the ID-based cryptosystem is that instead of using a random integer as each user's public key as in the traditional public-key systems, the user's real identity, such as user's name or email address, becomes the user's public key. However, all identity-based signature (IBS) schemes have the inherent key escrow problem, that is private key generator (PKG) knows the private key of each user. As a result, the PKG is able to sign any message on the users' behalf This nature violates the "non-repudiation" requirement of digital signatures. To solve the key escrow problem of the IBS while still taking advantage of the benefits of the IBS, certificateless digital signature (CDS) was introduced. In this paper, we propose a generalized approach to construct CDS schemes. In our proposed CDS scheme, the user's private key is known only to the user himself, therefore, it can eliminate the key escrow problem from the PKG. The proposed construction can be applied to all Discrete Logarithm (DL)-based signature schemes to convert a digital signature scheme into a CDS scheme. The proposed CDS scheme is secure against adaptive chosen-message attack in the random oracle model. In addition, it is also efficient in signature generation and verification. (C) 2008 Elsevier Inc. All rights reserved.
引用
收藏
页码:789 / 793
页数:5
相关论文
共 50 条
  • [21] TAO: Re-Thinking DL-based Microarchitecture Simulation
    Pandey S.
    Yazdanbakhsh A.
    Liu H.
    Performance Evaluation Review, 2024, 52 (01): : 23 - 24
  • [22] QA of DL-based dose calculations: determination of the application range
    Tsekas, G.
    Bol, G.
    Raaymakers, B. W.
    Kontaxis, C.
    RADIOTHERAPY AND ONCOLOGY, 2021, 161 : S56 - S57
  • [23] Gearbox fault diagnosis: A DL-based nonparametric filter approach
    Kumar, Vikash
    Gupta, Dipak
    Sarangi, Somnath
    JOURNAL OF VIBRATION AND CONTROL, 2025,
  • [24] A Dynamic Robust DL-Based Model for Android Malware Detection
    Ul Haq, Ikram
    Khan, Tamim Ahmed
    Akhunzada, Adnan
    IEEE ACCESS, 2021, 9 : 74510 - 74521
  • [25] Adopting GPU computing to support DL-based Earth science applications
    Wang, Zifu
    Li, Yun
    Wang, Kevin
    Cain, Jacob
    Salami, Mary
    Duffy, Daniel Q. Q.
    Little, Michael M. M.
    Yang, Chaowei
    INTERNATIONAL JOURNAL OF DIGITAL EARTH, 2023, 16 (01) : 2660 - 2680
  • [26] Effective Beamforming Design using DL-based Codebook Classification in RIS-Aided mmWave Systems
    Wang, Guoning
    Mu, Gaoze
    Guo, Shuyue
    Hou, Yanzhao
    Yang, Daquan
    Li, Na
    Tao, Xiaofeng
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [27] Realism versus Performance for Adversarial Examples Against DL-based NIDS
    Alatwi, Huda Ali
    Morisset, Charles
    38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023, 2023, : 1549 - 1557
  • [28] A DL-based Approach for Eliminating Concept Restriction Conflicts in Ontology Merging
    Lu, Yao
    Zhang, Guoyi
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 446 - 451
  • [29] A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks
    Qureshi, Sirajuddin
    He, Jingsha
    Tunio, Saima
    Zhu, Nafei
    Akhtar, Faheem
    Ullah, Faheem
    Nazir, Ahsan
    Wajahat, Ahsan
    IEEE ACCESS, 2021, 9 : 73938 - 73947
  • [30] An Application of Fuzzy DL-Based Semantic Perception to Soil Container Classification
    Eich, Markus
    2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR PRACTICAL ROBOT APPLICATIONS (TEPRA), 2013,