An efficient certificateless blind signature scheme without bilinear pairing.

Recently, the certificateless public key cryptography (CLPKC) has been studied widely since it could solve both of the certificate management problem in traditional public key cryptography (TPKC) and the key escrow problem in the identity-based public key cryptography (ID-based PKC). To satisfy requirements of different applications, many certificateless blind signature (CLBS) schemes using bilinear pairing for the CLPKC setting have been proposed. However, the bilinear pairing operation is very complicated. Therefore, the performance of those CLBS schemes is not very satisfactory. To solve the problem, we propose an efficient CLBS scheme without bilinear pairing. Performance analysis shows that the proposed scheme could reduce costs of computation and storage. Security analysis shows the proposed scheme is provably secure against both of two types of adversaries.

[1]  Xiaoyuan Yang,et al.  A Provably Secure Certificateless Blind Signature Scheme , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[2]  Jianhong Zhang,et al.  Efficient provable certificateless blind signature scheme , 2010, 2010 International Conference on Networking, Sensing and Control (ICNSC).

[3]  Rui Zhang,et al.  An efficient and provably‐secure certificateless signature scheme without bilinear pairings , 2012, Int. J. Commun. Syst..

[4]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[5]  Hu Jin,et al.  An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012 .

[6]  Jianhua Chen,et al.  An efficient certificateless proxy signature scheme without pairing , 2013, Math. Comput. Model..

[7]  Sahadeo Padhye,et al.  An efficient certificateless two-party authenticated key agreement protocol , 2012, Comput. Math. Appl..

[8]  Rongbo Lu,et al.  A Certificateless Restrictive Partially Blind Signature Scheme , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[9]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[10]  Rui Zhang,et al.  A new two-round certificateless authenticated key agreement protocol without bilinear pairings , 2011, Mathematical and computer modelling.

[11]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[12]  Xiaoni Du,et al.  A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..

[13]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[14]  Lei Zhang,et al.  Provably-secure electronic cash based on certificateless partially-blind signatures , 2011, Electron. Commer. Res. Appl..

[15]  Liqun Chen,et al.  Identity-based key agreement protocols from pairings , 2017, International Journal of Information Security.

[16]  Peng Gong,et al.  Further improvement of a certificateless signature scheme without pairing , 2014, Int. J. Commun. Syst..

[17]  Jianhua Chen,et al.  An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012, Inf. Fusion.

[18]  Qiaoyan Wen,et al.  Novel Efficient Certificateless Blind Signature Schemes , 2009, 2009 International Symposium on Computer Network and Multimedia Technology.

[19]  Lei Zhang,et al.  Certificateless signature and blind signature , 2008 .

[20]  Guomin Yang,et al.  Certificateless public key encryption: A new generic construction and two pairing-free schemes , 2011, Theor. Comput. Sci..

[21]  Sun,et al.  Secure Certificateless Encryption with Short Ciphertext , 2010 .

[22]  Gwoboa Horng,et al.  A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME , 2011 .

[23]  He Debiao,et al.  An ID-based proxy signature schemes without bilinear pairings , 2011 .

[24]  Liusheng Huang,et al.  Cryptanalysis of a certificateless signature scheme without pairings , 2013, Int. J. Commun. Syst..

[25]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[26]  Rui Zhang,et al.  An efficient identity-based blind signature scheme without bilinear pairings , 2011, Comput. Electr. Eng..

[27]  Jia-Lun Tsai,et al.  Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings , 2014, Int. J. Commun. Syst..

[28]  Jianhua Chen,et al.  An ID-based proxy signature schemes without bilinear pairings , 2011, Ann. des Télécommunications.

[29]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[30]  Jianhua Chen,et al.  New certificateless short signature scheme , 2013, IET Inf. Secur..

[31]  Jacques Stern,et al.  Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.

[32]  Sahadeo Padhye,et al.  A pairing‐free certificateless authenticated key agreement protocol , 2012, Int. J. Commun. Syst..

[33]  Yi Mu,et al.  Certificateless Signature Revisited , 2007, ACISP.