Abstract
Certificate-based signature (CBS) scheme preserves advantages of certificate-based encryption, such as implicit certification and no private key escrow problem. In this paper, we propose a new short and efficient CBS scheme in the random oracle model based on the Schnorr signature scheme. The short signature length and efficient computation make it particularly useful in power and bandwidth limited environment. In addition, we present the new application of CBS scheme to the Single Sign-On(SSO) problem in the cloud computing environment, which allows users to sign on only once and have their identities automatically verified by each application or service they want to access. Based on our new CBS scheme construction, the new SSO solution is much more efficient than the one based on proxy signature scheme.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Gentry, C.: Certificate-based Encryption and the Certificate Revocation Problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)
Kang, B.G., Park, J.H., Hahn, S.G.: A certificate-based signature scheme. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 99–111. Springer, Heidelberg (2004)
Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Certificate-based signature: Security model and efficient construction. In: López, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 110–125. Springer, Heidelberg (2007)
Liu, J.K., Baek, J., Susilo, W., Zhou, J.: Certificate-Based Signature Schemes without Pairings or Random Oracles. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 285–297. Springer, Heidelberg (2008)
Au, M.H., Liu, J.K., Susilo, W., Yuen, T.H.: Certificate based (linkable) ring signature. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, vol. 4464, pp. 79–92. Springer, Heidelberg (2007)
Liu, J., Bao, F., Zhou, J.: Short and Efficient Certificate-Based Signature. Cryptology ePrint Archive, Report 2011/192 (2011), http://eprint.iacr.org/
Mell, P., Grance, T.: Draft NIST working definition of cloud computing (2009), http://csrc.nist.gov/groups/SNS/cloud-computing/index.html (referenced on June 3, 2009)
De Clercq, J.: Single sign-on architectures. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 40–58. Springer, Heidelberg (2002)
Dodson, B., Sengupta, D., Boneh, D., Lam, M.S.: Secure, consumer-friendly web authentication and payments with a phone. In: Gris, M., Yang, G. (eds.) MobiCASE 2010. LNICST, vol. 76, pp. 17–38. Springer, Heidelberg (2012)
David, B.M., Tonicelli, R., Nascimento, A., et al.: Secure single sign-on and web authentication. Cryptology ePrint Archive, Report 2011/246, http://eprint.iacr.org/2011/246.pdf
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS 1996, pp. 48–57. ACM, New York (1996)
Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. Journal of Cryptology 25(1), 1–58 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shaohui, W., Suqin, C. (2014). Construction of Lightweight Certificate-Based Signature and Application in Cloud Computing. In: Sun, L., Ma, H., Hong, F. (eds) Advances in Wireless Sensor Networks. CWSN 2013. Communications in Computer and Information Science, vol 418. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54522-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-54522-1_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54521-4
Online ISBN: 978-3-642-54522-1
eBook Packages: Computer ScienceComputer Science (R0)