Computer Science ›› 2020, Vol. 47 ›› Issue (9): 304-310.doi: 10.11896/jsjkx.200500002

• Information Security • Previous Articles     Next Articles

Certificateless Signature Scheme Without Bilinear Pairings and Its Application in Distribution Network

LIU Shuai, CHEN Jian-hua   

  1. School of Mathematics and Statistics,Wuhan University,Wuhan 430072,China
  • Received:2020-05-06 Published:2020-09-10
  • About author:LIU Shuai,born in 1995,postgraduate.His main research interests include elliptic curve cryptography and information security.
    CHEN Jian-hua,born in 1964,Ph.D,professor,Ph.D supervisor.His main research interests include cryptography and information security.

Abstract: The certificateless cryptosystem solves the complex problem of public key certificate management in the traditional public key cryptosystem and the problem of key escrow in the identity based cryptosystem.This paper proposes a certificateless signature scheme based on the elliptic curve with no bilinear pairings.Under the assumption of random oracle model and the difficulty of elliptic curve discrete logarithm,by using the bifurcation lemma (the Forking lemma),this paper proves that the scheme can resist the attack of the first class of strong adversaries and the second class of adversaries.Then,the performance of the scheme is compared with that of the other four certificateless signature schemes based on elliptic curve proposed since 2016,and all signature schemes are implemented by C language,and the efficiency of all schemes is compared.The results show that the ave-rage total time consumption of the proposed scheme is similar to that of Jia scheme,and compared with that of Hassouna scheme,Zhang scheme and Karati scheme,the average total time consumption are decreased by 51.0%,10.4% and 22.1% respectively,which shows that the total efficiency of this scheme has some advantages.Finally,the signature scheme of this paper is applied to the message authentication of Modbus TCP (Transmission Control Protocol) communication in distribution network.The security analysis of the proposed authentication protocol shows that the proposed scheme can resist replay attack,camouflage attack and man in the middle attack.

Key words: Certificateless signature, Distribution network, Elliptic curve discrete logarithm problem, Modbus message, No bilinear pairings, The Forking Lemma

CLC Number: 

  • TN918
[1] PIATKOWSKA E,BAJRAKTARI A,CHHAJED D,et al.Tool support for data protection impact assessment in the smart grid[J].Elektrotechnik und Information stechnik,2017,134(1):26-29.
[2] DENG W,WEN K,ZHANG H,et al.Design and analysis of data encryption and authentication scheme for distribution grid[J].Computer Engineering & Software,2017,38(6):17-23.
[3] AL-RIYAMI S,PATERSON K G.Certificateless public keycryptography[C]//Advances in Cryptology-ASIACRYPT’03.Berlin:Springer-Verlag,2003.
[4] ZOU X F,XIAO Y X.Modbus telegram security of distribution network based on SM2[J].Power System Protection and Control,2018,46(12):151-157.
[5] QIU F,CHEN LL,LIN N,et al.Security analysis and improvement of Modbus message in distribution network based on SM9 [J].China Power,2019,52 (10):18-25.
[6] ZHANG Z H,ZHOU J,DING K,et al.The Applications of Asymmetric Encryption of Digital Signature Technology in Distribution Automation System[J].Electrical Automation,2012(3):43-45.
[7] ENGE A.Elliptic Curves and Their Applications to Cryptography-An Introduction[M].Kluwer Academic Publishers,1999:39-40.
[8] WU T,JING X J.Cryptanalysis and Improvement of a Certificateless Signature Scheme with Strong Unforgeability[J].Acta Electronica Sinica,2018,46(3):602-606.
[9] HUANG X,Mu Y,SUSILO W,et al.Certificateless Signature Revisited[C]// Australasian Conference on Information Security & Privacy.Washington D.C.,USA:IEEE Press,2007:308-322.
[10] POINTCHEVAL D,STERN J.Security Arguments for Digital Signatures and Blind Signatures[J].Journal of Cryptology,2000,13(3):361-396.
[11] HE D B,CHEN J H,ZHANG R.An efficient and provably-secure certificateless signature scheme without bilinear pairings[J].International Journal of Communication Systems,2011,25(11):1432-1442.
[12] HASSOUNA M,BASHIER E,BARRY B.A Strongly SecureCertificateless Digital Signature Scheme in The Random Oracle Model[J].International Journal of Network Security,2016,18(5):938-945.
[13] ZHANG Y,DENG R,ZHENG D,et al.Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-assisted Industrial IoT[J].IEEE Transactions on Industrial Informatics,2019,15(9):5099-5108.
[14] KRISHNAMOORTHY M,PERUMAL V.Secure and efficient hand-over authentication in WLAN using elliptic curve RSA[J].Computers & Electrical Engineering,2017,64:552-566.
[15] KARATI A,ISLAM S H,BISWAS G P.A Pairing-free andProvably Secure Certificateless Signature Scheme[J].Information Sciences,2018,450:378-391.
[16] JIA X Y,HE D B,LIU Q,et al.An efficient provably-securecertificateless signature scheme for Internet-of-Things deployment[J].Ad Hoc Networks,2018,71(15):78-87.
[1] ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337.
[2] WANG Xi-long, LI Xin, QIN Xiao-lin. Collaborative Scheduling of Source-Grid-Load-Storage with Distributed State Awareness UnderPower Internet of Things [J]. Computer Science, 2021, 48(2): 23-32.
[3] YE Sheng-nan, CHEN Jian-hua. Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme [J]. Computer Science, 2021, 48(10): 272-277.
[4] ZHENG Yi-neng. Research on Key Technologies of Quantum Channel Management in QKD Network [J]. Computer Science, 2018, 45(6A): 356-363.
[5] HU Xiao-ming, MA Chuang, SI Tao-zhi, JIANG Wen-rong, XU Hua-jie and TAN Wen-an. Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier [J]. Computer Science, 2017, 44(8): 168-175.
[6] CHEN Yan, WU Zan-hong, WANG Bo, REN Hai-jun and KONG Wei-chan. Key Technology of Access Network Supporting in Intelligent Power Distribution Business [J]. Computer Science, 2016, 43(Z6): 558-560.
[7] ZHANG Gui-jun, XIA Hua-dong, ZHOU Xiao-gen and ZHANG Bei-jin. Hybrid Differential Evolution Based on Tabu Search Algorithm for Distribution Network Line Planning [J]. Computer Science, 2016, 43(10): 248-255.
[8] ZHANG Yi-chen, LI Ji-guo and QIAN Na. Certificateless Strong Designated Verifier Signature Scheme [J]. Computer Science, 2015, 42(3): 132-135.
[9] . Certificateless Signature Scheme without Public Key Replaced [J]. Computer Science, 2012, 39(8): 92-95.
[10] . [J]. Computer Science, 2009, 36(2): 11-14.
[11] ZHAO Jin ,ZHANG Fu-Yan (Department of Computer Science and Technology. Nanjing University, Nanjing 210093). [J]. Computer Science, 2006, 33(12): 114-116.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!