期刊文献+

Secure mediated certificateless signature scheme 被引量:4

Secure mediated certificateless signature scheme
原文传递
导出
摘要 Ju et al. proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SEM) mechanism. This article presents a detailed cryptoanalysis of this scheme and shows that, in their proposed scheme, once a valid signature has been produced, the signer can recover his private key information and the instantaneous revocation property will be damaged. Furthermore, an improved mediated signature scheme, which can eliminate these disadvantages, is proposed, and security proof of the improved scheme under elliptic curve factorization problem (ECFP) assumption and bilinear computational diffie-hellman problem (BCDH) assumption is also proposed. Ju et al. proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SEM) mechanism. This article presents a detailed cryptoanalysis of this scheme and shows that, in their proposed scheme, once a valid signature has been produced, the signer can recover his private key information and the instantaneous revocation property will be damaged. Furthermore, an improved mediated signature scheme, which can eliminate these disadvantages, is proposed, and security proof of the improved scheme under elliptic curve factorization problem (ECFP) assumption and bilinear computational diffie-hellman problem (BCDH) assumption is also proposed.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第2期75-78,共4页 中国邮电高校学报(英文版)
基金 Program for New Century Excellent Talents in University and the National Natural Science Foundation of China (60373104, 90604009).
关键词 CERTIFICATELESS signature scheme bilinear pairing security mediator certificateless, signature scheme, bilinear pairing, security mediator
  • 相关文献

参考文献13

  • 1Gu Li-ze,Zhang Sheng,Yang Yi-xian.An improved proxy multi-signature scheme.The Journal of China Universities of Posts and Telecommunications,2005,12(1):10-14 被引量:1
  • 2Jia Xiao-yun,Luo Shou-shan,Yuan Chao-wei.A new signature scheme with shared verification.The Journal of China Universities of Posts and Telecommunications,2006,13(2):66-69 被引量:1
  • 3Shamir A.Identity based cryptosystems and signature scheme.Proceedings of CRYPTO 1984(LNCS 196),Aug 19-22,1984,Santa Barbara,CA,USA.Berlin,Germany,Springer-Verlag,1984:47-53 被引量:1
  • 4Al-Riyami S S,Paterson K G.Certificateless public key cryptography.Proceedings of CRYPTO 2003 (LNCS 2894),Nov 30-Dec 4,2003,Taipei,China.Berlin,Germany:4.Springer-Verlag,2003:452-473 被引量:1
  • 5Al-Riyami S S,Paterson K G.CBE from CL-PKE:a generic construction and efficient schemes.Proceedings of PKC 2005(LNCS 3386),Jan 23-26,2005,Les Diablerets,Switzerland.Berlin,Germany:Springer-Verlag,2005:398-415 被引量:1
  • 6Back J,Safavi-Nani R,Susilo W.Certificateless public key encryption without pairing.Proceedings of ISC 2005 (LNCS 3650),Sep 20-23,2005,Singapore,Berlin,Germany:Springer-Verlag,2005:134-148 被引量:1
  • 7Shi Y,Li J.Provable efficient certificateless public key encryption.Cryptology eprint Archive,Report 2005/287.http://eprint.iacr.org/2005/287 被引量:1
  • 8Huang X,Susilo W,Mu Y,et al.On the security of certificateless signature schemes from asiacryp to 2003.Proceedings of CANS 2005 (LNCS 3810),Dec 14-16,2005,Xiamen,China.Berlin,Germany:Springer-Verlag,2005:13-25 被引量:1
  • 9Li X,Chen K,Sun L.Certificateless signature and proxy signature schemes from bilinear pairings.Lithuanian Mathematical Journal,2005,45(1):76-83 被引量:1
  • 10Boneh D,Ding X,Tsudik G et al.A method for fast revocation of public key certificates and security capabilities.Proceedings of the 10th USENIX Security Aymposium,Jun 25-30,2001,Boson,MA,USA.Washington DC,USA:USENIX Association,2001:297-308 被引量:1

同被引文献28

  • 1AL-Riyami S S, Paterson K G.Certificateless public key cryptography[C].Proceedings of CRYPTO, LNCS 2894.Berlin, Germany: Springer-Verlag,2003:452-473. 被引量:1
  • 2Zhang Z F, Wong D S,Jing X,et al.Certificate-less public-key signature: security model and efficient construction [C]. Proceedings of ACNS,LNCS 3989.Berlin,Germany: Springer-Verlag, 2006:293-308. 被引量:1
  • 3LIU J K,AU M H,Susilo W.Self-generated- certificate public key cryptography and certificateless signature/encryption scheme in the standard model[J/OL].ASIACCS 2007, http://eprint.iacr.org/ 2006/373. 被引量:1
  • 4Huang X,Susilo W, MU Y, et al.On the security of certificateless signature schemes from Asiacrypto 2003 [C]. Proceedings of CANS 2005, LNCS 3810. Berlin, Germany: Springer-Verlag, 2005:13-25. 被引量:1
  • 5Choi K Y, Park J H,Hwang J Yet al.Efficient certificateless signature schemes[C].Proceedings of ACNS, LNCS 4521. Berlin, Germany: Springer-Verlag, 2007:443-458. 被引量:1
  • 6HUANG X,MU Y, SUSILO W, et al. Certificateless signature revisited[C]. Proceedings of ACISP 2007, LNCS 4586. Berlin, Germany: Springer-Verlag,2007:308-322. 被引量:1
  • 7BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing [C]. Proceedings of CRYPTO 2001, LNCS 2139. Berlin, Germany: Springer-Verlag, 2001: 213-229. 被引量:1
  • 8CHA J C,CHEON J H. An Identity-based signature from gap Diffie-Hellman groups [C]. Proceedings of PKC2003, LNCS 2567. Berlin, Germany: Springer-Verlag, 2003:18-30. 被引量:1
  • 9Pointcheval D,Stem J.Security proofs for signature schemes[C]. Proceedings of EUROCRYPT'96,LNCS 1070. Berlin, Germany: Springer-Verlag, 1996:387-398. 被引量:1
  • 10Shamir A.Identity-based ctyptosystems and signature schemes[C]//LNCS 196:Cryptology-Crypto'84.Berlin:Springer-Verlag,1985:7-53. 被引量:1

引证文献4

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部