A Short Certificateless Digital Signature Scheme

This paper extends the certificateless public key infrastructure model that was proposed in [M. Hassouna, B. Bari, N. Mohamed, and E. Bashier. An integrated public key infrastructure model based on certificateless crytography. International Journal of Computer Science and Information Security (IJCSIS), 11, 2013.] by proposing a new provable secure digital signature scheme to provide true non-repudiation. The proposed signature scheme is short and efficient. It has advantage that the Key Generation Center(KGC) has no contribution in signature generation/verification processes. Therefore, any compromise of the KGC does not affect the non-repudiation service of the system. Furthermore, even the KGC cannot do signature forgery by (temporarily) replacing the user’s public key.

[1]  Xiangxue Li,et al.  Certificateless signature and proxy signature schemes from bilinear pairings , 2005 .

[2]  Yaoxue Zhang,et al.  An improved certificateless authenticated key agreement protocol , 2012 .

[3]  Andreas Enge,et al.  Building Curves with Arbitrary Small MOV Degree over Finite Prime Fields , 2004, Journal of Cryptology.

[4]  C. Pandu Rangan,et al.  Certificateless KEM and Hybrid Signcryption Schemes Revisited , 2010, ISPEC.

[5]  Lei Zhang,et al.  A New Provably Secure Certificateless Signature Scheme , 2008, 2008 IEEE International Conference on Communications.

[6]  C. Pandu Rangan,et al.  CCA secure certificateless encryption schemes based on RSA , 2011, Proceedings of the International Conference on Security and Cryptography.

[7]  Da Li,et al.  Certificateless Signature Scheme without Random Oracles , 2009, ISA.

[8]  Fagen Li,et al.  An Improved Certificateless Signature Scheme Secure in the Standard Model , 2008, Fundam. Informaticae.

[9]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[10]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[11]  Paulo S. L. M. Barreto,et al.  Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.

[12]  Zhang Zhang,et al.  Certificateless Signcryption without Pairing , 2010, IACR Cryptol. ePrint Arch..

[13]  Steven D. Galbraith,et al.  Implementing the Tate Pairing , 2002, ANTS.

[14]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[15]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[16]  Bazara I. A. Barry,et al.  An Integrated Public Key Infrastructure Model Based on Certificateless Cryptography , 2015 .

[17]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[18]  Eihab B. M. Bashier,et al.  A Secure and Efficient Key Agreement Protocol Based on Certificateless Cryptography , 2012 .

[19]  Ashutosh Saxena,et al.  An Efficient Certificateless Signature Scheme , 2005, CIS.

[20]  Bok-Min Goi,et al.  An Efficient Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..

[21]  Qi Xia,et al.  Key Replacement Attack on Two Certificateless Signature Schemes without Random Oracles , 2010 .

[22]  Duncan S. Wong,et al.  Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.

[23]  Chik How Tan,et al.  Certificateless Authenticated Two-Party Key Agreement Protocols , 2006, ASIAN.

[24]  Paulo S. L. M. Barreto,et al.  Constructing Elliptic Curves with Prescribed Embedding Degrees , 2002, SCN.

[25]  Zhang Zhang,et al.  Efficient and provably secure certificateless signcryption from bilinear maps , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[26]  Qiaoyan Wen,et al.  A Secure and Efficient Certificateless Short Signature Schema , 2013 .

[27]  Yi Mu,et al.  Improved certificateless signature scheme provably secure in the standard model , 2012, IET Inf. Secur..

[28]  Chun-I Fan,et al.  Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings , 2011, J. Inf. Sci. Eng..

[29]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[30]  Jianhong Zhang,et al.  An efficient RSA-based certificateless signature scheme , 2012, J. Syst. Softw..

[31]  Kenneth G. Paterson,et al.  Certificateless Encryption Schemes Strongly Secure in the Standard Model , 2008, Public Key Cryptography.

[32]  Steven D. Galbraith,et al.  Supersingular Curves in Cryptography , 2001, ASIACRYPT.

[33]  Yong Tang,et al.  An Efficient Certificateless Signature from Pairings , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).