Certificateless Public Key Signature Schemes from Standard Algorithms

  • Zhaohui ChengEmail author
  • Liqun Chen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11125)


Certificateless public key cryptography (CL-PKC) is designed to have succinct public key management without using certificates at the same time avoid the key-escrow attribute in the identity-based cryptography. Security mechanisms employing implicit certificates achieve same goals. In this work, we first unify the security notions of these two types of mechanisms with a modified CL-PKC formulation. We further present a general key-pair generation algorithm for CL-PKC schemes and use it to construct certificateless public key signature (CL-PKS) schemes from standard algorithms. The technique, which we apply, helps defeat known-attacks against existing constructions, and the resulting schemes could be quickly deployed based on the existing standard algorithm implementations.


  1. 1.
    Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). Scholar
  2. 2.
    Al-Riyami, S.S., Paterson, K.G.: CBE from CL-PKE: a generic construction and efficient schemes. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 398–415. Springer, Heidelberg (2005). Scholar
  3. 3.
    An, J.H., Dodis, Y., Rabin, T.: On the security of joint signature and encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 83–107. Springer, Heidelberg (2002). Scholar
  4. 4.
    Arazi, B.: Certification of DL/EC Keys. Submission to P1363 meeting (1998).
  5. 5.
    Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134–148. Springer, Heidelberg (2005). Scholar
  6. 6.
    Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. J. Cryptol. 22, 1–61 (2009)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. J. Cryptol. 21, 178–199 (2008)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Bernstein, D.J.: Multi-User Schnorr Security, Revisited. Cryptology ePrint Archive, Report 2015/996 (2015)Google Scholar
  9. 9.
    Brown, D.: Generic groups, collision resistance, and ECDSA. Des. Codes Cryptogr. 35, 119–152 (2005)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Brown, D.: On the provable security of ECDSA. In: Advances in Elliptic Curve Cryptography, pp. 21–40. Cambridge University Press (2005)Google Scholar
  11. 11.
    Brown, D., Campagna, M., Vanstone, S.: Security of ECQV-certified ECDSA against passive adversaries. Cryptology ePrint Archive, Report 2009/620 (2009)Google Scholar
  12. 12.
    Brown, D.R.L., Gallant, R., Vanstone, S.A.: Provably secure implicit certificate schemes. In: Syverson, P. (ed.) FC 2001. LNCS, vol. 2339, pp. 156–165. Springer, Heidelberg (2002). Scholar
  13. 13.
    Certicom Research. SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV). Version 1.0. (2013)Google Scholar
  14. 14.
    Cheng, Z., Chen, L.: Certificateless Public Key Signature Schemes from Standard Algorithms (Expanded Version). Cryptology ePrint Archive, Report 2018/386 (2018)Google Scholar
  15. 15.
    Cheng, Z., Chen, L., Ling, L., Comley, R.: General and efficient certificateless public key encryption constructions. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 83–107. Springer, Heidelberg (2007). Scholar
  16. 16.
    Choi, K.Y., Park, J.H., Hwang, J.Y., Lee, D.H.: Efficient certificateless signature schemes. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 443–458. Springer, Heidelberg (2007). Scholar
  17. 17.
    Fersch, M., Kiltz, E., Poettering, B.: On the one-per-message unforgeability of (EC) DSA and its variants. In: Kalai, Y., Reyzin, L. (eds.) TCC 2017. LNCS, vol. 10678, pp. 519–534. Springer, Cham (2017). Scholar
  18. 18.
    GB/T 32918.2-2017. Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves-Part 2: Digital Signature Algorithm (2017)Google Scholar
  19. 19.
    Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003). Scholar
  20. 20.
    Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490–497. Springer, Heidelberg (1991). Scholar
  21. 21.
    Groves, M.: Elliptic Curve-Based Certificateless Signatures for Identity-Based Encryption (ECCSI). RFC 6507 (2012)Google Scholar
  22. 22.
    Harn, L., Ren, J., Lin, C.: Design of DL-based certificateless digital signatures. J. Syst. Softw. 82(5), 789–793 (2009)CrossRefGoogle Scholar
  23. 23.
    He, D., Chen, Y., Chen, J.: A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Math. Comput. Model. 54(11–12), 3143–3152 (2011)MathSciNetCrossRefGoogle Scholar
  24. 24.
    He, D., Chen, J., Zhang, R.: An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int. J. Commun. Syst. 25(11), 1432–1442 (2012)CrossRefGoogle Scholar
  25. 25.
    Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signature revisited. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 308–322. Springer, Heidelberg (2007). Scholar
  26. 26.
    Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the security of certificateless signature schemes from Asiacrypt 2003. Proc. CANS 2005, 13–25 (2005)Google Scholar
  27. 27.
    Jia, X., He, D., Liu, Q., Choo, K.-K.R.: An efficient provably-secure certificateless signature scheme for internet-of-things deployment. Ad Hoc Netw. (to appear)Google Scholar
  28. 28.
    ISO/IEC. Information Technology - Secruity Techniques - Digital Signatures with Appendix - Part 3: Discrete Logarithm Based Mechanisms. ISO/IEC 14888–3:2016 (2016)Google Scholar
  29. 29.
    ISO/IEC. Information Technology - Security Techniques - Encryption Algorithms - Part 2: Asymmetric Ciphers. ISO/IEC 18033–2:2006 (2006)Google Scholar
  30. 30.
    Lai, J., Kou, W.: Self-generated-certificate public key encryption without pairing. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 476–489. Springer, Heidelberg (2007). Scholar
  31. 31.
    Lippold, G., Boyd, C., Nieto, J.G.: Strongly secure certificateless key agreement. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 206–230. Springer, Heidelberg (2009). Scholar
  32. 32.
    Liu, W., Xie, Q., Wang, S., Han, L., Hu, B.: Pairing-free certificateless signature with security proof. J. Comput. Netw. Commun. 2014, 6 p. (2014). Article no. 792063CrossRefGoogle Scholar
  33. 33.
    Malone-Lee, J., Smart, N.P.: Modifications of ECDSA. In: Nyberg, K., Heys, H. (eds.) SAC 2002. LNCS, vol. 2595, pp. 1–12. Springer, Heidelberg (2003). Scholar
  34. 34.
    Menezes, A., Smart, N.P.: Security of signature schemes in a multi-user setting. Des. Codes Cryptogr. 33, 261–274 (2004)MathSciNetCrossRefGoogle Scholar
  35. 35.
    Pintsov, L.A., Vanstone, S.A.: Postal revenue collection in the digital age. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 105–120. Springer, Heidelberg (2001). Scholar
  36. 36.
    Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256–266. Springer, Heidelberg (1997). Scholar
  37. 37.
    Shafagh, H.: Leveraging public-key-based authentication for the Internet of Things. Master thesis.
  38. 38.
    STMicroelectronics. UM1924: STM32 Crypto Library.
  39. 39.
    Sun, Y., Zhang, F., Baek, J.: Strongly secure certificateless public key encryption without pairing. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 194–208. Springer, Heidelberg (2007). Scholar
  40. 40.
    Tian, M., Huang, L.: Cryptanalysis of a certificateless signature scheme without pairings. Int. J. Commun. Syst. 26(11), 1375–1381 (2013)CrossRefGoogle Scholar
  41. 41.
    Whyte, W., Weimerskircht, A., Kumar, V., Hehn, T.: A security credential management system for V2V communications. In: Proceedings of 2013 IEEE Vehicular Networking Conference, pp. 1–8 (2013)Google Scholar
  42. 42.
    Yeh, K.-H., Su, C.H., Choo, K.-K.R., Chiu, W.: A novel certificateless signature scheme for smart objects in the Internet-of-Things deployment. Sensors 2017, 17 (1001)CrossRefGoogle Scholar
  43. 43.
    Zhang, Z., Wong, D.S., Xu, J., Feng, D.: Certificateless public-key signature: security model and efficient construction. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 293–308. Springer, Heidelberg (2006). Scholar
  44. 44.
    Zhang, L., Zhang, F., Zhang, F.: New efficient certificateless signature scheme. In: Denko, M.K., Shih, C., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.H. (eds.) EUC 2007. LNCS, vol. 4809, pp. 692–703. Springer, Heidelberg (2007). Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.Olym Information Security Technology Ltd.ShenzhenChina
  2. 2.Surrey UniversityGuildfordEngland

Personalised recommendations