Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security

被引:4
作者
Gao, Wei [1 ,2 ]
Wang, Guilin [3 ]
Chen, Kefei [4 ]
Wang, Xueli [5 ]
机构
[1] Ludong Univ, Sch Math & Stat, Yantai 264025, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Nanjing 210044, Jiangsu, Peoples R China
[3] Huawei Technol Co Ltd, Singapore, Singapore
[4] Hangzhou Normal Univ, Dept Math, Hangzhou 311121, Zhejiang, Peoples R China
[5] South China Normal Univ, Sch Math, Guangzhou 510631, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
certificateless signature; certificate-based signature; identity based signature; provable security; ENCRYPTION; SCHEMES;
D O I
10.15388/Informatica.2017.127
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies the generic construction of certificate-based signature (CBS) from certificateless signature (CLS). This paper proposes a new generic conversion from CLS to CBS which is more intuitive, simpler, and provably secure without random oracles than the current one. To develop the security proof, we put forth one novel CLS security model which features a previously neglected but nontrivial attack and hence captures the CLS security notion more comprehensively. We show that many existing CLS schemes can be proved secure in the current model by slightly modifying its original security proof. Following this conversion, many provably secure CBS schemes can be constructed from the corresponding existing CLS schemes.
引用
收藏
页码:215 / 235
页数:21
相关论文
共 26 条
  • [1] Al-Riyami SS, 2005, LECT NOTES COMPUT SC, V3386, P398
  • [2] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [3] [Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
  • [4] [Anonymous], COMPUTER J
  • [5] [Anonymous], IACR CRYPTOLOGY EPRI
  • [6] The random oracle methodology, revisited
    Canetti, R
    Goldreich, O
    Halevi, S
    [J]. JOURNAL OF THE ACM, 2004, 51 (04) : 557 - 594
  • [7] A new provably secure certificateless short signature scheme
    Choi, Kyu Young
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 61 (07) : 1760 - 1768
  • [8] Gentry C, 2003, LECT NOTES COMPUT SC, V2656, P272
  • [9] A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks
    Guo, Ping
    Wang, Jin
    Geng, Xue Hua
    Kim, Chang Seob
    Kim, Jeong-Uk
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06): : 929 - 935
  • [10] Huang XY, 2005, LECT NOTES COMPUT SC, V3810, P13