Top-Level Secure Certificateless Signature Scheme in the Standard Model

In order to overcome the key escrow problem, Al- Riyami and Paterson introduced the concept of certificateless public key cryptography (CL-PKC) in 2003. CL-PKC requires neither public key certification nor the key escrow problem. After that, CL-PKC has been widely applied. In 1991, Girault defined three security levels of the key generation center (KGC), where the higher level of KGC means the stronger security of the system. Recently, lots of certificateless signature schemes and their security models have been presented. However, there is no certificateless signature scheme proposed in the literature that achieves the property of Girault's level-3 security without random oracles. In view of aforementioned issues, we propose a new construction of certificateless signature scheme. The proposed certificateless signature scheme is provably secure in the standard model and satisfies Girault's level-3 security. The security of the proposed scheme is based on the hardness of generalized computational Diffie-Hellman and many Diffie-Hellman problems.

[1]  Hu Xiong,et al.  Toward Certificateless Signcryption Scheme Without Random Oracles , 2014, IACR Cryptol. ePrint Arch..

[2]  Caixue Zhou,et al.  Certificateless Signcryption Scheme Without Random Oracles , 2018, Chinese Journal of Electronics.

[3]  Yi Mu,et al.  Improved certificateless signature scheme provably secure in the standard model , 2012, IET Inf. Secur..

[4]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[5]  Yi Mu,et al.  Certificateless Signature Revisited , 2007, ACISP.

[6]  Chenhui Wang,et al.  Certificateless signature scheme with security enhanced in the standard model , 2014, Inf. Process. Lett..

[7]  Anna Lysyanskaya,et al.  Unique Signatures and Verifiable Random Functions from the DH-DDH Separation , 2002, CRYPTO.

[8]  Qiaoyan Wen,et al.  Efficient and provably-secure certificateless short signature scheme from bilinear pairings , 2009, Comput. Stand. Interfaces.

[9]  Fagen Li,et al.  An Improved Certificateless Signature Scheme Secure in the Standard Model , 2008, Fundam. Informaticae.

[10]  Kyung-Ah Shim,et al.  Security Pitfalls of the Certificateless Signature and Multi-Receiver Signcryption Schemes , 2011, Fundam. Informaticae.

[11]  Sen-Shan Huang,et al.  Secure Certificateless Signature with Revocation in the Standard Model , 2014 .

[12]  Chun-I Fan,et al.  Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings , 2011, J. Inf. Sci. Eng..

[13]  Joseph K. Liu,et al.  Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.

[14]  Chun-I Fan,et al.  Strongly Secure Certificateless Signature Scheme Supporting Batch Verification , 2014 .

[15]  Li Xu,et al.  Strongly Secure Certificateless Signature Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack Ability , 2017, J. Inf. Sci. Eng..

[16]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[17]  Kenneth G. Paterson,et al.  Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.

[18]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[19]  Jian Weng,et al.  Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC , 2017, Secur. Commun. Networks.

[20]  Marc Girault,et al.  Self-Certified Public Keys , 1991, EUROCRYPT.

[21]  Li Xu,et al.  Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model" , 2015, IIH-MSP.

[22]  Qi Xia,et al.  Key Replacement Attack on Two Certificateless Signature Schemes without Random Oracles , 2010 .

[23]  David Pointcheval,et al.  About the Security of MTI/C0 and MQV , 2006, SCN.

[24]  Gwoboa Horng,et al.  Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes , 2015, J. Inf. Sci. Eng..

[25]  Joonsang Baek,et al.  Certificate-Based Signature Schemes without Pairings or Random Oracles , 2008, ISC.