Computer Science ›› 2021, Vol. 48 ›› Issue (10): 272-277.doi: 10.11896/jsjkx.201200117

;

• Information Security • Previous Articles     Next Articles

Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme

YE Sheng-nan, CHEN Jian-hua   

  1. School of Mathematics and Statistics,Wuhan University,Wuhan 430000,China
  • Received:2020-12-14 Revised:2021-05-03 Online:2021-10-15 Published:2021-10-18
  • About author:YE Sheng-nan,born in 1996,postgra-duate.Her main research interests include cryptography and information security.
    CHEN Jian-hua,born in 1964,Ph.D,professor,Ph.D supervisor.His main research interests include cryptography and information security.

Abstract: Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and traditional PKI public key cryptosystem,overcomes the key escrow problem of identity-based public key cryptosystem and the certificate management problem of PKI system,and has obvious advantages.By analysing the security of a strongly secure certificateless signature scheme proposed by Hassouna,et al,it shows that the scheme cannot resist the attack of falsifying messages and do not use private key generated by system master key to sign.So it is not a certificateless signature scheme.On this basis,an improved certificateless signature scheme is proposed and it proves the scheme can resist the attack of the first class of strong adversaries and the second class of adversaries.In the random oracle model and under the assumption of the Diffie-Hellman problem of the elliptic curve,the improved scheme satisfies the existential forgery.

Key words: Bilinear pairings, Certificateless signature, Elliptic curve discrete Diffie-Hellman problem, Random oracle model, Security analysis

CLC Number: 

  • TN918
[1]SHAMIR A.Identity-Based Cryptosystems and SignatureSchemes[C]//Workshop on the Theory & Application of Cryptographic Techniques.Berlin:Springer,1984.
[2]BARRETO P S L M,KIM H Y,LYNN B,et al.Efficient Algorithms for Pairing-Based Cryptosystems[C]//International Cryptology Conference on Advances in Cryptology.Berlin:Springer,2002.
[3]BARRETO P,LYNN B,SCOTT M.Constructing EllipticCurves with Prescribed Embedding Degrees[C]//Springer Berlin Heidelberg.Berlin:Springer, 2003.
[4]BONEH D,LYNN B,SHACHAM H.Short Signatures from the Weil Pairing[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer,2001.
[5]HESS F.Efficient Identity Based Signature Schemes Based on Pairings[C]//International Workshop on Selected Areas in Cryptography.Berlin:Springer, 2003.
[6]RIYAMI S S,PATERSON K G.Certificateless Public KeyCryptography[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer,2003.
[7]DENT A W,BENOÎT L,PATERSON K G.Certificateless encryption schemes strongly secure in the standard model[C]//Public Key Cryptography-PKC 2008,11th International Workshop on Practice and Theory in Public-Key Cryptography,Barcelona,Spain,2008.Berlin:Springer,2008.
[8]VIVEK S S,SELVI S S D,RANGAN C P.CCA2 Secure Certificateless Encryption Schemes Based on RSA[C]//International Conference on Security & Cryptography.IEEE,2014.
[9]WANG C,HUANG H,TANG Y.An Efficient CertificatelessSignature from Pairings[C]//International Symposium on Data.IEEE,2007.
[10]XIONG H,QIN Z,LI F.An Improved Certificateless Signature Scheme Secure in the Standard Model[J].Fundamenta Informa-ticae,2008,88(1):193-206.
[11]ZHANG L,ZHANG F.A New Provably Secure Certificateless Signature Scheme[C]//IEEE International Conference on Communications.IEEE,2008.
[12]SHIM K A.Forgery Attacks on Two Provably Secure Certificateless Signature Schemes[J].Information Sciences,2020,521:81-87.
[13]YANG X,PEI X,CHEN G,et al.A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments[J].Sensors,2019,19(12):2692.
[14]HUANG L,ZHOU J,ZHANG G,et al.Certificateless PublicVerification for the Outsourced Data Integrity in Cloud Storage[J].Journal of Circuits,Systems and Computers,2018,27(11):1850181.1-1850181.17.
[15]YANG X D,WANG M D,PEI X Z,et al.Security Analysis and Improvement of a Certificateless Signature Scheme in theStan-dard Model[J].Acta Electronica Sinica,2019,47(9):1972-1978.
[16]DU H Z,WEN Q Y,ZHANG S S,et al.A new provably secure certificateless signature scheme for Internet of Things[J].Ad Hoc Networks,2019,100:102074.
[17]YANG X,PEI X,CHEN G,et al.A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments[J].Sensors,2019,19(12):2692.
[18]SELVI S S D,VIVEK S S,RANGAN C P.Certificateless KEM and Hybrid Signcryption Schemes Revisited[C]//International Conference on Information Security Practice and Experience.Berlin:Springer,2010.
[19]XIE W,ZHANG Z.Certificateless signcryption without pairing[J/OL].IACR Cryptology ePrint Archive,2010,187.https://www.researchgate.net/publication/220336349_Certificateless_Signcryption_without_Pairing.
[20]XIE W,ZHANG Z.Efficient and provably secure certificateless signcryption from bilinear maps[C]//IEEE International Conference on Wireless Communications.IEEE,2010.
[21]HASSOUNA M,BASHIER E,BARRY B.A Short Certificateless Digital Signature Scheme[C]//International Conference of Digital Information Processing,Data Mining and Wireless Communications.2015.
[22]HASSOUNA M,BASHIER E,BARRY B.A Strongly SecureCertificateless Digital Signature Scheme in The Random Oracle Model[J].International Journal of Network Security,2016,18(5):938-945.
[23]HUANG X,MU Y,SUSILO W,et al.Certificateless Signature Revisited[C]//Australasian Conference on Information Security &Privacy.Springer-Verlag,2007.
[24]ZHANG Z,WONG D S,XU J,et al.Certificateless Public-Key Signature:Security Model and Efficient Construction[C]//International Conference on Applied Cryptography & Network Security.Springer-Verlag,2006.
[25]CHEN J S,HUANG Z J.Efficient certificbased signature schenle[J].Computer Engineering Applications,2012,48(30):98-102.
[26]LIU J K, BAEK J, SUSILO W,et al.Certificate-Based Signature Schemes without Pairings or Random Oracles[C]//Information Security,International Conference,Isc,Taipei,Taiwan,September.Berlin:Springer,2008.
[27]MING Y,WANG Y M.Efficient Certificateless SignatureScheme Based on Bilinear Pairings[J].Journal of University of Electronic Science and Technology of China,2008,37(2):175-177.
[1] ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337.
[2] LIU Shuai, CHEN Jian-hua. Certificateless Signature Scheme Without Bilinear Pairings and Its Application in Distribution Network [J]. Computer Science, 2020, 47(9): 304-310.
[3] ZUO Li-ming, CHEN Zuo-song, XIA Ping-ping, TANG Peng-zhi, KANG Wen-yang. Improved Efficient Certificateless Short Signature Scheme [J]. Computer Science, 2019, 46(4): 172-176.
[4] YUAN Chao, XU Mi-xue and SI Xue-ming. Optimization Scheme of Consensus Algorithm Based on Aggregation Signature [J]. Computer Science, 2018, 45(2): 53-56.
[5] DING Qing-yang, WANG Xiu-li, ZHU Jian-ming and SONG Biao. Information Security Framework Based on Blockchain for Cyber-physics System [J]. Computer Science, 2018, 45(2): 32-39.
[6] HU Xiao-ming, MA Chuang, SI Tao-zhi, JIANG Wen-rong, XU Hua-jie and TAN Wen-an. Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier [J]. Computer Science, 2017, 44(8): 168-175.
[7] CHEN Shao-hua, FAN Xiao-guang, CONG Wei, HUANG Jin-ke and SUN Xian-ming. Grid-based Identity Signcryption Algorithm and Application in Ad Hoc Network [J]. Computer Science, 2017, 44(6): 168-173.
[8] ZHU Jun, YUAN Xiao-feng, GOU Zhi-nan and YANG Yi. Certificateless Threshold Decryption Scheme for Data Security of Recommendation System [J]. Computer Science, 2017, 44(11): 253-263.
[9] MA Yuan-yuan, CHEN Zhe, WANG Chen, FEI Jia-xuan and HUANG Xiu-li. Security Analysis Model of Power Intelligent Unit Transmission Protocols [J]. Computer Science, 2016, 43(Z11): 329-337.
[10] ZHANG Yi-chen, LI Ji-guo and QIAN Na. Certificateless Strong Designated Verifier Signature Scheme [J]. Computer Science, 2015, 42(3): 132-135.
[11] SUN Ling,TIAN Yuan and HUANG Hou-biao. Nodes Key Agreement Scheme between Clusters in Aeronautical Mobile Ad hoc Network [J]. Computer Science, 2014, 41(Z6): 369-373.
[12] ZHOU Cai-xue and TAN Xu-jie. Certificate-based Multi-proxy Multi-signature Scheme [J]. Computer Science, 2014, 41(Z11): 272-276.
[13] WEI Yun,WEI Fu-shan and MA Chuan-gui. Non-interactive Key Exchange Protocol Based on Certificateless Public Key Cryptography [J]. Computer Science, 2014, 41(12): 101-106.
[14] WANG Dian-gang,DING Xue-feng and HUANG Kun. Security Analysis and Improvement of Strongly Secure Certificateless Key Agreement Protocol [J]. Computer Science, 2013, 40(Z11): 203-209.
[15] LIU Qing-hua,SONG Yu-qing and LIU Yi. Efficient Content Extraction Signature Scheme without Certification [J]. Computer Science, 2013, 40(8): 136-139.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!