Improved certificate-based signature scheme without random oracles

被引:19
作者
Lu, Yang [1 ]
Li, Jiguo [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat Engn, Nanjing 211100, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
PROVABLY SECURE; MALICIOUS KGC; ATTACKS;
D O I
10.1049/iet-ifs.2015.0188
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificate-based cryptography is a useful primitive that combines traditional public key cryptography (PKC) and identity-based cryptography (IBC). It not only solves the key escrow problem inherent in IBC, but also simplifies the certificate problem in traditional PKC. So far, several certificate-based signature (CBS) schemes have been proposed in the literature. However, none of them consider the malicious certificate authority (CA) attack. Cryptanalysis shows that two previous CBS schemes without random oracles fail in achieving unforgeability under such attack. To overcome the security weakness in these schemes, the authors propose an improved CBS scheme that can withstand malicious CA attacks. They prove it to be existentially unforgeable against chosen message attacks under the computational Diffie-Hellman assumption in the standard model. Compared with the previous standard-model CBS schemes, the proposed scheme has obvious advantages in both the computation and communication efficiency.
引用
收藏
页码:80 / 86
页数:7
相关论文
共 11 条
  • [1] Hwang YH, 2008, J UNIVERS COMPUT SCI, V14, P463
  • [2] Provably secure certificate-based signature scheme without pairings
    Li, Jiguo
    Wang, Zhiwei
    Zhang, Yichen
    [J]. INFORMATION SCIENCES, 2013, 233 : 313 - 320
  • [3] An efficient short certificate-based signature scheme
    Li, Jiguo
    Huang, Xinyi
    Zhang, Yichen
    Xu, Lizhong
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (02) : 314 - 322
  • [4] Constructions of certificate-based signature secure against key replacement attacks
    Li, Jiguo
    Huang, Xinyi
    Mu, Yi
    Susilo, Willy
    Wu, Qianhong
    [J]. JOURNAL OF COMPUTER SECURITY, 2010, 18 (03) : 421 - 449
  • [5] Certificate-based verifiably encrypted signatures from pairings
    Shao, Zuhua
    [J]. INFORMATION SCIENCES, 2008, 178 (10) : 2360 - 2373
  • [6] Cryptanalysis of a certificateless signcryption scheme in the standard model
    Weng, Jian
    Yao, Guoxiang
    Deng, Robert H.
    Chen, Min-Rong
    Li, Xiangxue
    [J]. INFORMATION SCIENCES, 2011, 181 (03) : 661 - 667
  • [7] Wu W, 2009, J UNIVERS COMPUT SCI, V15, P1659
  • [8] Xiong H, 2008, FUND INFORM, V88, P193
  • [9] Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles
    Yang, Wenjie
    Zhang, Futai
    Shen, Limin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 445 - 454
  • [10] Improved certificateless signature scheme provably secure in the standard model
    Yu, Y.
    Mu, Y.
    Wang, G.
    Xia, Q.
    Yang, B.
    [J]. IET INFORMATION SECURITY, 2012, 6 (02) : 102 - 110