An Improved RSA-Based Certificateless Signature Scheme

Article Preview

Abstract:

Certificateless-based signature can eliminate the need of certificates in the Public Key Infrastructure and solve the inherent key escrow problem in the identity-based cryptography. In 2012 Zhang et al. [J. Zhang and J. Mao, An efficient RSA-based certificateless signature scheme, Journal of Systems and Software, vol. 85, pp. 638-642, 2012] proposed the first certificateless signature scheme based on RSA operations and showed that their scheme is provably secure in the random oracle model. However, He et al. [D. He, M.Khan, and S. Wu, On the security of a RSA-based certificateless signature scheme, International Journal of Network Security, vol.16, no.1, pp.78-80, 2014] recently showed that Zhang et al.'s scheme is insecure against a type I adversary who can replace users' public keys. In this paper, we propose an improved version based on RSA which not only keeps the original security properties of the signature, but also is secure against a type I adversary.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2165-2168

Citation:

Online since:

November 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Adi Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, vol. 7: 47-53, (1984).

DOI: 10.1007/3-540-39568-7_5

Google Scholar

[2] S. Al-Riyami and K. Paterson, Certificateless public key cryptography, in Proceedings of Asiacrypt '03, p.452–473, (2003).

DOI: 10.1007/978-3-540-40061-5_29

Google Scholar

[3] K. Y. Choi, J. H. Park, and D. H. Lee, A new provably secure certificateless short signature scheme, Computers and Mathematics with Applications, vol. 61, no. 7, pp.1760-1768, (2011).

DOI: 10.1016/j.camwa.2011.02.003

Google Scholar

[4] H. Du and Q. Wen, Efficient and provably-secure certificateless short signature scheme from bilinear pairings, Computer Standards and Interfaces, vol. 31, no. 2, p.390–394, (2009).

DOI: 10.1016/j.csi.2008.05.013

Google Scholar

[5] D. He, J. Chen, and R. Zhang, An efficient and provably-secure certificateless signature scheme without bilinear pairings, International Journal of Communication Systems, vol. 25, no. 11, pp.1432-1442, (2011).

DOI: 10.1002/dac.1330

Google Scholar

[6] X. Huang, Y. Mu, W. Susilo, D. Wong, and W. Wu, Certificateless signature revisited, in ACISP 2007, p.308–322, (2007).

DOI: 10.1007/978-3-540-73458-1_23

Google Scholar

[7] C. Ma and J. Ao, Certificateless group oriented signature secure against key replacement attack, International Journal of Network Security, vol. 12, no. 1, pp.1-6, (2011).

Google Scholar

[8] J. Zhang and J. Mao, An efficient RSA-based certificateless signature scheme, Journal of Systems and Software, vol. 85, pp.638-642, (2012).

DOI: 10.1016/j.jss.2011.09.036

Google Scholar

[9] D. He, M. Khan, and S. Wu, On the security of a RSA-based certificateless signature scheme, International Journal of Network Security, vol. 16, no. 1, pp.78-80, (2014).

Google Scholar

[10] G. Ateniese, J. Camenisch, M. Joye and G. Tsudik, A practical and provably secure coalition resistant group signature scheme, in Proceedings of CRYPTO00, Santa Barbara, USA, pp.255-270, (2000).

DOI: 10.1007/3-540-44598-6_16

Google Scholar