Computer Science ›› 2019, Vol. 46 ›› Issue (4): 172-176.doi: 10.11896/j.issn.1002-137X.2019.04.027

• Information Security • Previous Articles     Next Articles

Improved Efficient Certificateless Short Signature Scheme

ZUO Li-ming1,2, CHEN Zuo-song1,2, XIA Ping-ping1,2, TANG Peng-zhi1, KANG Wen-yang1,2   

  1. School of Science,East China Jiaotong University,Nanchang 330013,China1
    SEC Institute,East China Jiaotong University,Nanchang 330013,China2
  • Received:2018-03-21 Online:2019-04-15 Published:2019-04-23

Abstract: Certificateless public key cryptography has always been a hot topic in cryptography research,which solves not only the problem of storing and managing certificates in the PKI (public key infrastructure) certificate cryptosystem but also the key escrow problem in the identity-based cryptography system.Aiming at the problem that the traditional certificateless digital signature scheme is susceptiable to the public key substitute attacks,the definition of traditional certificateless digital signature was improved,and a short signature scheme based on the new definition was proposed.It was proved that the scheme is secure under the difficult problem of Inv-CDH (inverse computational Diffie-Hellman) and random oracle model,and the scheme was implemented.Finally,efficiency analysis and experiment comparison with several classic schemes were carried out.The result shows that the scheme has low computational complexity and high efficiency,and is suitable for application scenarios with weak computing capability and transmitting capability.

Key words: Certificateless PKC, Random oracle model, Short signature

CLC Number: 

  • TP309.7
[1]SHAMIR A.Identity-based cryptosystems and signature sche- mes[C]∥Workshop on the theory and application of cryptographic techniques.Berlin Heidelberg:Springer,1984:47-53.
[2]AL-RIYAMI S S,PATERSON K G.Certificateless public key cryptography[C]∥International Conference on the Theory and Application of Cryptology and Information Security.Berlin Heidelberg:Springer,2003:452-473.
[3]DU H,WEN Q.Efficient and provably-secure certificateless short signature scheme from bilinear pairings[J].Computer Standards & Interfaces,2009,31(2):390-394.
[4]ISLAM S K H,BISWAS G P.Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography[J].International Journal of Computer Mathematics,2013,90(11):2244-2258.
[5]HORNG S J,TZENG S F,HUANG P H,et al.An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks[J].Information Sciences,2015,317(C):48-66.
[6]DU H Z.A Secure and Efficient Certificateless Signature Scheme in the Standard Model[C]∥ The International Con-ference on Computer Science and Technology.Singapore:World Scientific,2017:278-286.
[7]KARATI A,ISLAM S H,KARUPPIAH M.Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments[J].IEEE Transactions on Industrial Informatics,2018,PP(99):1-1.
[8]TSAI J L,LO N W,WU T C.Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings[J].International Journal of Communication Systems,2014,27(7):1083-1090.
[9]LIU E G,WANG X,ZHOU H J,et al.Improved Certificateless Proxy Blind Signature Scheme[J].Computer Science,2016,43(8):92-94.(in Chinese) 刘二根,王霞,周华静,等.改进的无证书代理盲签名方案[J].计算机科学,2016,43(8):92-94.
[10]CHANG S,LEE H S,LEE J,et al.Security Analysis of a Certificateless Signature from Lattices[J/OL].http://www.hidawi.com/journals/scn/2017/3413567/.
[11]GONG P,LI P.Further improvement of a certificateless signature scheme without pairing[J].International Journal of Communication Systems,2015,27(10):2083-2091.
[12]BHATIA T,VERMA A K.Cryptanalysis and improvement of certificateless proxy signcryption scheme for eprescription system in mobile cloud computing[J].Annals of Telecommunications,2017,72(9-10):563-576.
[13]LI J,YUAN H,ZHANG Y.Cryptanalysis and Improvement for Certificateless Aggregate Signature[J].Fundamenta Informaticae,2018,157(1-2):111-123.
[14]HU X M,LIU Y,XU H J,et al.Analysis and Improvement of Two Certificateless Signature Scheme[J].Journal of Chinese Computer Systems,2016,37(10):2264-2268.
[15]ZHANG L,ZHANG F T.A Method to Constr-uct a Class of Certificateless Signature Schemes [J].Chinese Journal of Computers,2009,32(5):940-945.
[16]LI X,CHEN K,SUN L.Certificateless signatu-re and proxy signature schemes from bilinear pairin-gs[J].Lithuanian Mathematical Journal,2005,45(1):76-83.
[17]YAP W S,HENG S H,GOI B M.An efficient certificateless signature scheme[C]∥International Conference on Embedded and Ubiquitous Computing.Berlin Heidelberg:Springer,2006:322-331.
[18]GORANTLA M C,SAXENA A.An efficient certificateless signature scheme[C]∥Computational Intelligence and Security.Berlin Heidelberg:Springer,2005:110-116.
[19]ZHANF Y Q,LU W L,TANG C M.Research on An Efficient and Practical Cloud-based Digital Signature Scheme[J].Netinfo Security,2016,2016(7):1-6.
[1] YE Sheng-nan, CHEN Jian-hua. Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme [J]. Computer Science, 2021, 48(10): 272-277.
[2] ZHANG Jun-he, ZHOU Qing-lei and HAN Ying-Jie. Sanitizable Signature Scheme Based on Ring Signature and Short Signature [J]. Computer Science, 2020, 47(6A): 386-390.
[3] CHEN Shao-hua, FAN Xiao-guang, CONG Wei, HUANG Jin-ke and SUN Xian-ming. Grid-based Identity Signcryption Algorithm and Application in Ad Hoc Network [J]. Computer Science, 2017, 44(6): 168-173.
[4] ZHU Jun, YUAN Xiao-feng, GOU Zhi-nan and YANG Yi. Certificateless Threshold Decryption Scheme for Data Security of Recommendation System [J]. Computer Science, 2017, 44(11): 253-263.
[5] SUN Ling,TIAN Yuan and HUANG Hou-biao. Nodes Key Agreement Scheme between Clusters in Aeronautical Mobile Ad hoc Network [J]. Computer Science, 2014, 41(Z6): 369-373.
[6] ZHOU Cai-xue and TAN Xu-jie. Certificate-based Multi-proxy Multi-signature Scheme [J]. Computer Science, 2014, 41(Z11): 272-276.
[7] WEI Yun,WEI Fu-shan and MA Chuan-gui. Non-interactive Key Exchange Protocol Based on Certificateless Public Key Cryptography [J]. Computer Science, 2014, 41(12): 101-106.
[8] WANG Dian-gang,DING Xue-feng and HUANG Kun. Security Analysis and Improvement of Strongly Secure Certificateless Key Agreement Protocol [J]. Computer Science, 2013, 40(Z11): 203-209.
[9] LIU Qing-hua,SONG Yu-qing and LIU Yi. Efficient Content Extraction Signature Scheme without Certification [J]. Computer Science, 2013, 40(8): 136-139.
[10] FU Xiao-jing,ZHANG Guo-yin and MA Chun-guang. Dynamic Threshold Attributes-based Signature Scheme [J]. Computer Science, 2013, 40(7): 93-97.
[11] LI Chao-ling,CHEN Yue,WANG Cheng-liang,LI Wen-jun and WANG Shuang-jin. Identity-based Broadcast Signcryption with Proxy Re-signature [J]. Computer Science, 2013, 40(5): 153-157.
[12] ZHOU Cai-xue. ID-based Generalized Signcryption without Trusted Party [J]. Computer Science, 2013, 40(4): 142-146.
[13] SUN Hua and ZHENG Xue-feng. Provably Secure and Efficient Certificateless Signcryption Scheme [J]. Computer Science, 2013, 40(11): 112-116.
[14] ZHOU Cai-xue and WANG Fei-peng. Improved Certificateless Signcryption Scheme without Pairing [J]. Computer Science, 2013, 40(10): 139-143.
[15] . Efficient Identity Based Online/Offline Signcryption Scheme [J]. Computer Science, 2012, 39(8): 42-46.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!