Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings

被引:25
作者
Islam, S. K. Hafizul [1 ]
Biswas, G. P. [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
Certificateless cryptography; Elliptic curve cryptosystem; Designated verifier; Digital signature; Bilinear pairing;
D O I
10.1016/j.jksuci.2012.06.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Diffie and Hellman first invented the public key cryptosystem (PKC) wherein the public key infrastructure (PKI) is used for the management of public keys; however, the PKI-based cryptosystems suffer from heavy management trouble of public keys and certificates. An alternative solution to the PKI is Shamir's identity-based cryptosystems (IBC), which eliminate the need of public key certificates; however, the most important shortcoming of IBC is the key escrow problem. To cope with these problems, Al-Riyami and Paterson proposed a novel scheme of certificateless PKC (CL-PKC) by combining the advantages of PKI and IBC. Since then, several certificateless signature schemes have been designed and most of them have been analyzed and proven insecure against different types of adversaries. Besides, the researchers have given very less attention to the certificateless strong designated verifier signature (CL-SDVS) scheme. Therefore, we proposed a CL-SDVS scheme using elliptic curve bilinear parings in this paper. Our scheme, which is provably secure in the random oracle model with the intractability of BDH and CDH assumptions, supports all desirable security necessities of the CL-SDVS scheme such as strongness, source hiding and non-delegatability. The rigorous security analysis and comparison with others guarantee the better performance of the proposed scheme. (C) 2012 King Saud University. Production and hosting by Elsevier B.V. All rights reserved.
引用
收藏
页码:51 / 61
页数:11
相关论文
共 38 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
Bellare Mihir, 1993, CCS 93 P 1 ACM C COM, P62
[3]  
Bo Yang, 2009, Proceedings of the 2009 International Conference on Computational Intelligence and Security (CIS 2009), P432, DOI 10.1109/CIS.2009.191
[4]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[5]  
Cao X., 2006, ATTACK CERTIFICATELE
[6]   A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges [J].
Cao, Xuefei ;
Kou, Weidong ;
Du, Xiaoni .
INFORMATION SCIENCES, 2010, 180 (15) :2895-2903
[7]  
Choi KY, 2007, LECT NOTES COMPUT SC, V4521, P443
[8]   A new provably secure certificateless short signature scheme [J].
Choi, Kyu Young ;
Park, Jong Hwan ;
Lee, Dong Hoon .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 61 (07) :1760-1768
[9]   ID-based digital signature scheme on the elliptic curve cryptosystem [J].
Chung, Yu Fang ;
Huang, Kuo Hsuan ;
Lai, Feipei ;
Chen, Tzer Shyong .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (06) :601-604
[10]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654