Abstract
The notion of certificateless cryptography is aimed to eliminate the use of certificates in traditional public key cryptography and also to solve the key-escrow problem in identity-based cryptography. Many kinds of security models have been designed for certificateless cryptography and many new schemes have been introduced based on the correspondence of the security models. In generally speaking, a stronger security model can ensure a certificateless cryptosystem with a higher security level, but a realistic model can lead to a more efficient scheme. In this paper, we focus on the efficiency of a certificateless signature (CLS) scheme and introduce an efficient CLS scheme with short signature size. On one hand, the security of the scheme is based on a realistic model. In this model, an adversary is not allowed to get any valid signature under false public keys. On the other hand, our scheme is as efficient as BLS short signature scheme in both communication and computation and, therefore, turns out to be more efficient than other CLS schemes proposed so far. We provide a rigorous security proof of our scheme in the random oracle model. The security of our scheme is based on the k-CAA hard problem and a new discovered hard problem, namely the modified k-CAA problem. Our scheme can be applied to systems where signatures are typed in by human or systems with low-bandwidth channels and/or low-computation power.
This is a preview of subscription content, access via your institution.
References
Au MH, Chen J, Liu JK, Mu Y, Wong DS, Yang G (2007) Malicious KGC attacks in certificateless cryptography. In: Proceedings of ASIACCS’07, pp 302–311
Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: Advances in cryptology—ASISCRYPT’03. Lecture notes in computer science, vol 2894. Springer, Berlin, pp 452–473
Barreto PSLM, Kim HY, Lynn B, Scott M (2002) Efficient algorithm for pairing-based cryptosystems. In: Advances in cryptology—CRYPTO’02. Lecture notes in computer science, vol 2442. Springer, Berlin, pp 354–369
Barreto PSLM, Lynn B, Scott M (2003) On the selection of pairing-friendly groups. In: Proceedings of SAC’03. Lecture notes in computer science, vol 3006. Springer, Berlin, pp 17–25
Bellare M, Neven G (2006) Multi-signatures in the plain public-key model and a general forking lemma. In: Proceedings of the 13th ACM conference on computer and communication security, pp 390–398
Bellare M, Palacio A (2004) The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols. In: Advances in cryptology—CRYPTO’04. Lecture notes in computer science, vol 3152. Springer, Berlin, pp 273–289
Boneh D, Boyen X (2004) Short signatures without rando oracles. In: Advances in cryptology—EUROCRYPT’04. Lecture notes in computer science, vol 3027. Springer, Berlin, pp 56–73
Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing. In: Advances in cryptology—ASIACRYPT’01. Lecture notes in computer science, vol 2248. Springer, Berlin, pp 514–533
Choi KY, Park JH, Hwang JY, Lee DH (2007) Efficient certificateless signature schemes. In: Proceedings of ACNS’07. Lecture notes in computer science, vol 4521. Springer, Berlin, pp 443–458
Damgård I (1992) Towards practical public key systems secure against chosen ciphertext attacks. In: Advances in cryptology—CRYPTO’91. Lecture notes in computer science, vol 576. Springer, Berlin, pp 445–456
Du H, Wen Q (2009) Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Int J Comput Stand Interfaces 31:390–394
Goldwasser S, Micali S, Rivest RL (1988) A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput 17(2):281–308
Gorantla MC, Saxena A (2005) An efficient certificateless signature scheme. In: Proceedings of CIS’05. Lecture notes in artificial intelligence, vol 3802(II). Springer, Berlin, pp 110–116
Hada S, Tanaka T (1998) On the existence of 3-round zero-knowledge protocols. In: Advances in cryptology—CRYPTO’98. Lecture notes in computer science, vol 1462. Springer, Berlin, pp 408–423
Hu BC, Wong DS, Zhang Z, Deng X (2007) Certificatelss signature: a new security model and an improved generic construction. Designs Codes Cryptography 42(2):109–126
Huang X, Mu Y, Susilo W, Wong DS, Wu W (2007) Certificateless signature revisted. In: Proceedings of ACISP’07. Lecture notes in computer science, vol 4586. Springer, Berlin, pp 308–322
Huang X, Susilo W, Mu Y, Zhang F (2005) On the security of certificateless signature schemes from Asiacrypt 2003. In: Proceedings of CANS’05. Lecture notes in computer science, vol 3810. Springer, Berlin, pp 13–25
Liu JK, Au MH, Susilo W (2007) Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Proceedings of ASIACCS’07, pp 273–283
Mitsunari S, Sakai R, Kasahara M (2002) A new traitor tracing. J IEICE Trans Fundam E85-A(2):481–484
Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Advances in cryptology—CRYPTO’84. Lecture notes in computer science, vol 0196. Springer, Berlin, pp 47–53
Tô V, Safavi-Naini R, Zhang F (2003) New traitor tracing schemes using bilinear map. In: Proceedings of 2003 DRM workshop, pp 67–76
Tso R, Okamoto T, Okamoto E (2009) Efficient short signatures from pairing. In: Proceedings of ITNG’09, pp 417–422
Wu J, Stinson DR (2007) An efficient identification protocol and the knowledge-of-exponent assumption, Cryptology ePrint Archive: Report 2007/479
Yap WL, Heng SH, Goi BM (2006) An efficient certificteless signature. In: Proceedings of EUC workshops’06. Lecture notes in computer science, vol 4097. Springer, Berlin, pp 322–331
Yap WL, Chow SSM, Heng SH, Goi BM (2007) Security mediated certificateless signatures. In: Proceedings of ACNS’07. Lecture notes in computer science, vol 4521. Springer, Berlin, pp 459–477
Yum DH, Lee PJ (2004) Generic construction of certificateless signature. In: Proceedings of ACISP’04. Lecture note in computer science, vol 3108. Springer, Berlin, pp 200–211
Zhang F, Chen X, Susilo W, Mu Y (2005) A new short signature scheme without random oracles from bilinear pairings. Cryptology ePrint Archive, Repost 2005/386. Available at http://eprint.iacr.org/2005/386.pdf
Zhang F, Safavi-Naini R, Susilo W (2003) An efficient signature scheme from binilear pairings and its applications. In: Proceedings of PKC’04. Lecture notes in computer science, vol 3947. Springer, Berlin, pp 277–290
Zhang Z, Wong DS, Xu J, Feng D (2006) Certificateless public-key signature: security model and efficient construction. In: Proceedings of ACNS’06. Lecture notes in computer science, vol 3989. Springer, Berlin, pp 293–308
Zheng L, Zhang F, Zhang F (2007) New efficient certificateless signature scheme. In: Proceedings of EUC’07. Lecture notes in computer science, vol 4809. Springer, Berlin, pp 692–703
Author information
Authors and Affiliations
Corresponding author
Additional information
A preliminary version of the extended abstract of partial results appeared in CANS2008 (Tso et al. in Lecture Notes in Computer Science, vol. 5339, pp. 64–79, 2008).
Rights and permissions
About this article
Cite this article
Tso, R., Yi, X. & Huang, X. Efficient and short certificateless signatures secure against realistic adversaries. J Supercomput 55, 173–191 (2011). https://doi.org/10.1007/s11227-010-0427-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-010-0427-x