Design of DL-based certificateless digital signatures

被引:16
|
作者
Harn, Lein [2 ]
Ren, Jian [1 ]
Lin, Changlu [3 ,4 ]
机构
[1] Michigan State Univ, Dept Elect & Comp Engn, E Lansing, MI 48864 USA
[2] Univ Missouri, Dept Comp Sci & Elect Engn, Kansas City, MO 64110 USA
[3] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[4] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Fuzhou 350007, Fujian, Peoples R China
基金
美国国家科学基金会;
关键词
ID-based cryptosystem; ID-based signature; Provable security; Key escrow; Certificateless digital signature; IDENTITY-BASED SIGNATURE; GENERIC CONSTRUCTION; SECURITY PROOFS; DIFFIE-HELLMAN; SCHEME; EFFICIENT; PAIRINGS; MODEL;
D O I
10.1016/j.jss.2008.11.844
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Public-key cryptosystems without requiring digital certificates are very attractive in wireless communications due to limitations imposed by Communication bandwidth and computational resource of the mobile wireless communication devices. To eliminate public-key digital certificate, Shamir introduced the concept of the identity-based (ID-based) cryptosystem. The main advantage of the ID-based cryptosystem is that instead of using a random integer as each user's public key as in the traditional public-key systems, the user's real identity, such as user's name or email address, becomes the user's public key. However, all identity-based signature (IBS) schemes have the inherent key escrow problem, that is private key generator (PKG) knows the private key of each user. As a result, the PKG is able to sign any message on the users' behalf This nature violates the "non-repudiation" requirement of digital signatures. To solve the key escrow problem of the IBS while still taking advantage of the benefits of the IBS, certificateless digital signature (CDS) was introduced. In this paper, we propose a generalized approach to construct CDS schemes. In our proposed CDS scheme, the user's private key is known only to the user himself, therefore, it can eliminate the key escrow problem from the PKG. The proposed construction can be applied to all Discrete Logarithm (DL)-based signature schemes to convert a digital signature scheme into a CDS scheme. The proposed CDS scheme is secure against adaptive chosen-message attack in the random oracle model. In addition, it is also efficient in signature generation and verification. (C) 2008 Elsevier Inc. All rights reserved.
引用
收藏
页码:789 / 793
页数:5
相关论文
共 50 条
  • [31] DL-Based The Knowledge Description of Emergency Plan Systems and Its Application
    Dong CunXiang
    Wang WenJun
    Yang Peng
    THIRD INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING (MUE 2009), 2009, : 364 - 368
  • [32] Medical Image Classification Using DL-based Feature Extraction in IoMT
    Thimmapuram M.
    Salvadi S.R.
    Pallati N.
    Aluvalu R.
    Recent Patents on Engineering, 2024, 18 (09)
  • [33] Certificateless and certificate-based signatures from lattices
    Tian, Miaomiao
    Huang, Liusheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1575 - 1586
  • [34] Exploring the performance of the DL-based OTFS detection scheme in Internet of vehicles
    Gong, Yi
    Li, Qingyu
    Liu, Lei
    Meng, Fanke
    Hou, Xiangwang
    Xu, Zhan
    VEHICULAR COMMUNICATIONS, 2023, 43
  • [35] Sparse Adversarial Attacks against DL-Based Automatic Modulation Classification
    Jiang, Zenghui
    Zeng, Weijun
    Zhou, Xingyu
    Feng, Peilun
    Chen, Pu
    Yin, Shenqian
    Han, Changzhi
    Li, Lin
    ELECTRONICS, 2023, 12 (18)
  • [36] DLCP2F: a DL-based cryptocurrency price prediction framework
    Aljadani A.
    Discover Artificial Intelligence, 2022, 2 (01):
  • [37] CERTIFICATELESS RING SIGNATURE BASED ON RSA PROBLEM AND DL PROBLEM
    Deng, Lunzhi
    RAIRO-THEORETICAL INFORMATICS AND APPLICATIONS, 2015, 49 (04): : 307 - 318
  • [38] DL-Based Clutter Removal in Migrated GPR Data for Detection of Buried Target
    Ni, Zhi-Kang
    Pan, Jun
    Shi, Cheng
    Ye, Shengbo
    Zhao, Di
    Fang, Guangyou
    IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, 2022, 19
  • [39] Insect Pest Trap Development and DL-Based Pest Detection: A Comprehensive Review
    Passias, Athanasios
    Tsakalos, Karolos-Alexandros
    Rigogiannis, Nick
    Voglitsis, Dionisis
    Papanikolaou, Nick
    Michalopoulou, Maria
    Broufas, George
    Sirakoulis, Georgios Ch.
    IEEE Transactions on AgriFood Electronics, 2024, 2 (02): : 323 - 334
  • [40] AdaComplete: improve DL-based code completion method’s domain adaptability
    Zejun Wang
    Fang Liu
    Yiyang Hao
    Zhi Jin
    Automated Software Engineering, 2023, 30