ZHANG Yichen, LI Jiguo, WANG Zhiwei, et al., “A New Efficient Certificate-Based Signature Scheme,” Chinese Journal of Electronics, vol. 24, no. 4, pp. 776-782, 2015, doi: 10.1049/cje.2015.10.019
Citation: ZHANG Yichen, LI Jiguo, WANG Zhiwei, et al., “A New Efficient Certificate-Based Signature Scheme,” Chinese Journal of Electronics, vol. 24, no. 4, pp. 776-782, 2015, doi: 10.1049/cje.2015.10.019

A New Efficient Certificate-Based Signature Scheme

doi: 10.1049/cje.2015.10.019
Funds:  This work is supported by the National Natural Science Foundation of China (No.61272542), the Fundamental Research Funds for the Central Universities (No.2013B07014) and the Priority Academic Program Development of Jiangsu Higher Education Institutions.
More Information
  • Corresponding author: LI Jiguo (corresponding author) was born in 1970. He receivedthe B.S. degree in applied mathematics from HeilongjiangUniversity. He received the M.S. degree in mathematics and Ph.D.degree in computer science from Harbin Institute of Technologyin 2000 and 2003, respectively. He is currently a professor in theCollege of Computer and Information, Hohai University, Nanjing,China. His research interests include cryptography theory and technology,information security, and cloud computing security. (Email:ljg1688@163.com)
  • Received Date: 2015-03-04
  • Rev Recd Date: 2015-05-13
  • Publish Date: 2015-10-10
  • Certificate-based cryptography is a new kind of public key algorithm, which combines the merits of traditional Public key infrastructure (PKI) and identity-based cryptography. It removes the inherent key escrow problem in the identity-based cryptography and eliminates the certificate revocation problem and third-party queries in the traditional PKI. In this paper, we propose an efficient certificate-based signature scheme based on bilinear pairings. Under the strong security model of certificate-based signature scheme, we prove that our scheme is existentially unforgeable against adaptive chosen message and identity attacks in the random oracle. In our scheme, only two pairing operations are needed in the signing and verification processes. Compared with some certificate-based signature schemes from bilinear pairings, our scheme enjoys more advantage in computational cost and communicational cost.
  • loading
  • A. Shamir, "Identity-based cryptosystems and signature schemes", Proc. of CRYPTO 1984, LNCS, Springer, Heidelberg, Vol.196, pp.47-53, 1985.
    S.S. Al-Riyami and K.G. Paterson, "Certificateless public key cryptography", Proc. of ASIACRYPT 2003, LNCS, Springer, Heidelberg, Vol.2894, pp.452-473, 2003.
    X.Y. Huang, W. Susilo, Y. Mu, et al. "On the security of certificateless signature schemes from asiacrypt 2003", Proc. of CANS 2005, LNCS, Springer, Heidelberg, Vol.3810, pp.13-25, 2005.
    J.G. Li, X.Y. Huang, Y. Mu, et al. "Cryptanalysis and improvement of an efficient certificateless signature scheme", Journal of Communications and Networks, Vol.10, No.1, pp.10-17, 2008.
    C. Gentry, "Certificate-based encryption and the certificate revocation problem", Proc. of EUROCRYPT 2003, LNCS, Springer, Heidelberg, Vol.2656, pp.272-293, 2003.
    B.G. Kang, J.H. Park and S.G. Hahn, "A Certificate-based signature scheme", Proc. of CT-RSA 2004, LNCS, Springer, Heidelberg, Vol.2964, pp.99-111, 2004.
    J.G. Li, X.Y. Huang, Y. Mu, et al. "Certificate-based signature: Security model and efficient construction", Proc. of EuroPKI 2007, LNCS, Springer, Heidelberg, Vol.4582, pp.110-125, 2007.
    J.G. Li, X.Y. Huang, Y. Mu, et al. "Constructions of certificatebased signature secure against key replacement attacks", Journal of Computer Security, Vol.18, No.3, pp.421-449, 2010.
    W. Wu, Y. Mu, W. Susilo, et al. "Certificate-based signatures: New definitions and a generic construction from certificateless signatures", Proc. of WISA 2008, LNCS, Springer, Heidelberg, Vol.5379, pp.99-114, 2009.
    J. Liu, J. Baek, W. Susilo, et al. "Certificate-based signature schemes without pairings or random oracles", Proc. of ISC 2008, LNCS, Springer, Heidelberg, Vol.5222, pp.285-297, 2008.
    J.H. Zhang, "On the security of a certificate-based signature scheme and its improvement with pairings", Proc. of ISPEC 2009, LNCS, Springer, Heidelberg, Vol.5451, pp.47-58, 2009.
    Y. Ming and Y. Wang, "Efficient certificate-based signature scheme", Proc. of IAS 2009, IEEE, Vol.2, pp.87-90, 2009.
    J. Zhang, H. Chen and Q. Geng, "An efficient certificatebased signature scheme without pairings", Proc. of WCSE 2009, IEEE, Vol.2, pp.44-48, 2009.
    J.G. Li, Z.W. Wang and Y.C. Zhang, "Provably secure certificate-based signature scheme without pairings", Information Sciences, Vol.233, No.6, pp.313-320, 2013.
    M.H. Au, J.K. Liu, W. Susilo,et al. "Certificate based (linkable) ring signature", Proc. of ISPEC 2007, LNCS, Springer, Heidelberg, Vol.4464, pp.79-92, 2007.
    L.H. Wang, J.Shao, Z.F. Cao,et al. "A certificate-based proxy cryptosystem with revocable proxy decryption power", Proc. of INDOCRYPT 2007, LNCS, Springer, Heidelberg, Vol.4859, pp.297-311, 2007.
    J.G. Li, L.Z. Xu and Y.C. Zhang, "Provably secure certificatebased proxy signature schemes", Journal of Computers, Vol.4, No.6, pp.444-452, 2009.
    J.G. Li, X.Y. Huang, Y.C. Zhang, et al. "An efficient short certificate-based signature scheme", Journal of Systems and Software, Vol.85, No.2, pp.314-322, 2012.
    J.G. Li, Y.C. Zhang and H.Y. Teng, "A forward-secure certificate-based signature scheme in the standard model", Proc. of CSS 2012, LNCS, Springer, Heidelberg, Vol.7672, pp.362- 376, 2012.
    D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures", Journal of Cryptology, Vol.13, No.3, pp.361-396, 2000.
    A.D. Caro, "Java pairing-based cryptography library", available at http://gas.dia.unisa.it/projects/jpbc, 2013-12-4.
    B. Lynn, "Pairing-based cryptography (PBC) library", available at http://crypto.stanford.edu/pbc, 2013-6-14.
    Q.H. Yu, J.G. Li, Y.C. Zhang, et al. "Certificate-based encryption resilient to key leakage", Journal of Systems and Software, DOI: 10.1016/j.jss.2015.05.066, 2015-5-8.
    Q.H. Yu, J.G. Li and Y.C. Zhang, "Leakage-resilient certificatebased encryption", Security and Communication Networks, DOI:10.1002/sec.1258, 2015-6-16
  • 加载中


    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (426) PDF downloads(565) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint