An efficient RSA-based certificateless signature scheme

Until now, the only known construction of certificateless signature scheme is mainly based on the rather new and untested assumptions related to bilinear maps. But the implementations of pairings are more time-consuming than exponentiation operator in a RSA group. As an industry standard cryptographic algorithm, RSA is widely applied in real-life scenarios and provides many interfaces for the applied software. However, to the best of our knowledge, there does not exist RSA-based certificateless signature scheme. To overcome this problem, we present a RSA-based construction of certificateless signature scheme in the paper. And the scheme is shown to be secure in the random oracles model. The security of the scheme is closely related to the RSA problem and the discrete logarithm problem.

[1]  Jacques Stern,et al.  Security Proofs for Signature Schemes , 1996, EUROCRYPT.

[2]  Qiong Huang,et al.  Generic Certificateless Encryption in the Standard Model , 2007, IWSEC.

[3]  Duncan S. Wong,et al.  Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.

[4]  Tatsuaki Okamoto,et al.  Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations , 1997, CRYPTO.

[5]  Peter Gutmann,et al.  PKI: It's Not Dead, Just Resting , 2002, Computer.

[6]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[7]  Da Li,et al.  Certificateless Signature Scheme without Random Oracles , 2009, ISA.

[8]  Kenneth G. Paterson,et al.  Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..

[9]  Mani Anand Self generated certificate public key cryptography for e commerce , 2011 .

[10]  Mihir Bellare,et al.  Identity-Based Multi-signatures from RSA , 2007, CT-RSA.

[11]  Ashutosh Saxena,et al.  An Efficient Certificateless Signature Scheme , 2005, CIS.

[12]  Pil Joong Lee,et al.  Generic Construction of Certificateless Signature , 2004, ACISP.

[13]  Yi Mu,et al.  Certificateless Signature Revisited , 2007, ACISP.

[14]  Joseph K. Liu,et al.  Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.

[15]  Yi Mu,et al.  Malicious KGC attacks in certificateless cryptography , 2007, ASIACCS '07.

[16]  Jianhong Zhang,et al.  Security Analysis of Two Signature Schemes and Their Improved Schemes , 2007, ICCSA.

[17]  Birgit Pfitzmann,et al.  Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees , 1997, EUROCRYPT.

[18]  Antoine Joux,et al.  Separating Decision Diffie–Hellman from Computational Diffie–Hellman in Cryptographic Groups , 2003, Journal of Cryptology.

[19]  Robert H. Deng,et al.  RSA-Based Certificateless Public Key Encryption , 2009, ISPEC.

[20]  Yi Mu,et al.  On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.

[21]  Antoine Joux,et al.  Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups , 2001, IACR Cryptology ePrint Archive.

[22]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[23]  Jianhong Zhang,et al.  Security Analysis and their Improvement of Two Signature Schemes , 2008, 2008 The 9th International Conference for Young Computer Scientists.