A certificate-based proxy signature with message recovery without bilinear pairing

In this paper, we propose the first provable secure certificate-based proxy signature (CBPS) with message recovery without bilinear pairing. In 2003, Gentry introduced the concept of certificate-based cryptography to solve certificate management and key escrow problems in public key infrastructure and identity-based cryptosystems, respectively. Because the overall cost of pairing computation is higher than scalar multiplication (e.g., over elliptic curve group), consequently, the CBPS schemes without pairings would be more efficient. According to the available research in this regard, our scheme is the first provable secure CBPS scheme with message recovery that is based on the elliptic curve discrete logarithm problem. We prove the security of the presented scheme in the random oracle model against existential forgery under adaptive chosen message and ID attacks. Moreover, the paper will also show how it would be possible to convert this scheme to the CBPS scheme without message recovery. This scheme has more applications in cases with constrain power and restricted bandwidth. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Je Hong Park,et al.  A Certificate-Based Signature Scheme , 2004, CT-RSA.

[2]  Xiaotie Deng,et al.  Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.

[3]  Yi Mu,et al.  Certificate-Based Signature: Security Model and Efficient Construction , 2007, EuroPKI.

[4]  Sahadeo Padhye,et al.  ECDLP‐based certificateless proxy signature scheme with message recovery , 2015, Trans. Emerg. Telecommun. Technol..

[5]  Harendra Singh,et al.  ID-based proxy signature scheme with message recovery , 2012, J. Syst. Softw..

[6]  L. Huang,et al.  Cryptanalysis of an ID-based proxy signature scheme with message recovery , 2012 .

[7]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[8]  Yi Mu,et al.  On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.

[9]  Jianhua Chen,et al.  An ID-based proxy signature schemes without bilinear pairings , 2011, Ann. des Télécommunications.

[10]  Joonsang Baek,et al.  Certificate-Based Signature Schemes without Pairings or Random Oracles , 2008, ISC.

[11]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[12]  R. A. Rueppel,et al.  Message recovery for signature schemes based on the discrete logarithm problem , 1994, EUROCRYPT.

[13]  Lizhong Xu,et al.  Provably Secure Certificate-based Proxy Signature Schemes , 2009, J. Comput..

[14]  Zhenfu Cao,et al.  A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power , 2007, INDOCRYPT.

[15]  Craig Gentry,et al.  Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.

[16]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[17]  Zhenjie Huang,et al.  Certificate-based proxy signature , 2010, 2010 IEEE International Conference on Progress in Informatics and Computing.

[18]  Qian Liu,et al.  A certificate-based strong designated verifier proxy signature scheme , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[19]  Debiao He,et al.  On the Security of a Certificateless Proxy Signature Scheme with Message Recovery , 2013 .

[20]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .