Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings

被引:25
作者
Islam, S. K. Hafizul [1 ]
Biswas, G. P. [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
Certificateless cryptography; Elliptic curve cryptosystem; Designated verifier; Digital signature; Bilinear pairing;
D O I
10.1016/j.jksuci.2012.06.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Diffie and Hellman first invented the public key cryptosystem (PKC) wherein the public key infrastructure (PKI) is used for the management of public keys; however, the PKI-based cryptosystems suffer from heavy management trouble of public keys and certificates. An alternative solution to the PKI is Shamir's identity-based cryptosystems (IBC), which eliminate the need of public key certificates; however, the most important shortcoming of IBC is the key escrow problem. To cope with these problems, Al-Riyami and Paterson proposed a novel scheme of certificateless PKC (CL-PKC) by combining the advantages of PKI and IBC. Since then, several certificateless signature schemes have been designed and most of them have been analyzed and proven insecure against different types of adversaries. Besides, the researchers have given very less attention to the certificateless strong designated verifier signature (CL-SDVS) scheme. Therefore, we proposed a CL-SDVS scheme using elliptic curve bilinear parings in this paper. Our scheme, which is provably secure in the random oracle model with the intractability of BDH and CDH assumptions, supports all desirable security necessities of the CL-SDVS scheme such as strongness, source hiding and non-delegatability. The rigorous security analysis and comparison with others guarantee the better performance of the proposed scheme. (C) 2012 King Saud University. Production and hosting by Elsevier B.V. All rights reserved.
引用
收藏
页码:51 / 61
页数:11
相关论文
共 38 条
[11]  
Du H., 2007, EFFICIENT PROVABLY S
[12]  
Fan C-I., 2009, P JWIS09, P1
[13]  
Fengyin Li, 2011, Proceedings of the 2011 International Conference on Network Computing and Information Security (NCIS), P35, DOI 10.1109/NCIS.2011.15
[14]  
GIRAULT M, 1991, LECT NOTES COMPUT SC, V547, P490
[15]  
Gorantla MC, 2005, LECT NOTES ARTIF INT, V3802, P110
[16]  
Hongzhen D, 2009, CHINESE J ELECTRON, V18, P95
[17]  
Hu BC, 2006, LECT NOTES COMPUT SC, V4058, P235
[18]   Attacks against Two Provably Secure Certificateless Signature Schemes [J].
Hu Guozheng ;
Hong Fan .
2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, :246-+
[19]  
Huang XY, 2006, 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, P15
[20]  
Huang XY, 2005, LECT NOTES COMPUT SC, V3810, P13