Informatica logo


Login Register

  1. Home
  2. Issues
  3. Volume 30, Issue 4 (2019)
  4. A New Provably Secure Certificateless Si ...

Informatica

Information Submit your article For Referees Help ATTENTION!
  • Article info
  • Full article
  • Related articles
  • Cited by
  • More
    Article info Full article Related articles Cited by

A New Provably Secure Certificateless Signature with Revocation in the Standard Model
Volume 30, Issue 4 (2019), pp. 711–728
Qian Mei   Yanan Zhao   Hu Xiong  

Authors

 
Placeholder
https://doi.org/10.15388/Informatica.2019.226
Pub. online: 1 January 2019      Type: Research Article      Open accessOpen Access

Received
1 November 2018
Accepted
1 March 2019
Published
1 January 2019

Abstract

The primitive of certificateless signature, since its invention, has become a widely studied paradigm due to the lack of key escrow problem and certificate management problem. However, this primitive cannot resist catastrophic damage caused by key exposure. Therefore, it is necessary to integrate revocation mechanism into certificateless signature. In this paper, we propose a new certificateless signature scheme with revocation (RCLS) and prove its security under the standard model. In the meanwhile, our scheme can resist malicious-but-passive Key Generation Center (KGC) attacks that were not possible in previous solutions. The theoretical analysis shows our scheme has high efficiency and practicality.

References

 
Al-Riyami, S.S., Paterson, K.G. (2003). Certificateless public key cryptography. In: Advances in Cryptology – ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, pp. 452–473.
 
Bao, F., Deng, R.H., Zhu, H. (2003). Variations of diffie-hellman problem. In: International Conference on Information and Communications Security. Springer, pp. 301–312.
 
Boneh, D., Ding, X., Tsudik, G., Wong, C.M. (2001). A method for fast revocation of public key certificates and security capabilities. In: USENIX Security Symposium, pp. 22–22.
 
Canetti, R., Goldreich, O., Halevi, S. (2004). The random oracle methodology, revisited. Journal of the ACM, 51(4), 557–594.
 
Chow, S.S., Boyd, C., Nieto, J.M.G. (2006). Security-mediated certificateless cryptography. In: Public Key Cryptography – PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, 2006, Proceedings. Springer, pp. 508–524.
 
ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469–472.
 
He, D., Chen, J., Zhang, R. (2012). An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems, 25(11), 1432–1442.
 
Housley, R., Polk, W., Ford, W., Solo, D. (2002). Internet X. 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile.
 
Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W. (2007). Certificateless signature revisited. In: Proceedings of Information Security and Privacy, 12th Australasian Conference, ACISP 2007, pp. 308–322.
 
Huang, X., Susilo, W., Mu, Y., Zhang, F. (2005). On the security of certificateless signature schemes from asiacrypt 2003. In: Proceedings of Cryptology and Network Security, 4th International Conference, CANS 2005, pp. 13–25.
 
Hung, Y.H., Tseng, Y.M., Huang, S.S. (2016). A revocable certificateless short signature scheme and its authentication application. Informatica, 27(3), 549–572.
 
Jia, X., He, D., Liu, Q., Choo, K.K.R. (2018). An efficient provably-secure certificateless signature scheme for internet-of-things deployment. Ad Hoc Networks, 71(5), 78–87.
 
Ju, H.S., Kim, D.Y., Lee, D.H., Lim, J., Chun, K. (2005). Efficient revocation of security capability in certificateless public key cryptography. In: International Conference on Knowledge-Based and Intelligent Information and Engineering Systems. Springer, pp. 453–459.
 
Karati, A., Islam, S.H., Biswas, G.P. (2018a). A pairing-free and provably secure certificateless signature scheme. Information Sciences, 450, 378–391.
 
Karati, A., Islam, S.H., Karuppiah, M. (2018b). Provably secure and lightweight certificateless signature scheme for IIoT environments. IEEE Transactions on Industrial Informatics, 14(8), 3701–3711.
 
Liu, J.K., Au, M.H., Susilo, W. (2007). Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model: extended abstract. In: ACM Symposium on Information, Computer and Communications Security, pp. 273–283.
 
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques. Springer, pp. 47–53.
 
Shen, L., Zhang, F., Sun, Y. (2013). Efficient revocable certificateless encryption secure in the standard model. The Computer Journal, 57(4), 592–601.
 
Shim, K.A. (2018a). A new certificateless signature scheme provably secure in the standard model. IEEE Systems Journal, 99, 1–10.
 
Shim, K.A. (2018b). Comments on “Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks”. IEEE Transactions on Information Forensics and Security. https://doi.org/10.1109/TIFS.2018.2871761.
 
Sun, Y., Zhang, F., Fu, A. (2018). Revocable certificateless encryption with ciphertext evolution. Australasian Conference on Information Security and Privacy, 27(3), 741–749.
 
Sun, Y., Zhang, F., Shen, L., Deng, R.H. (2014). A revocable certificateless signature scheme. JCP, 9(8), 1843–1850.
 
Tsai, T.T., Huang, S.S., Tseng, Y.M. (2014). Secure certificateless signature with revocation in the standard model. Mathematical Problems in Engineering, 2014(11), 1–16.
 
Tsai, T.T., Tseng, Y.M. (2015). Revocable certificateless public key encryption. Information Sciences, 9(4), 824–833.
 
Xia, Q., Xu, C.X., Yu, Y. (2010). Key replacement attack on two certificateless signature schemes without random oracles. Key Engineering Materials, 439, 1606–1611.
 
Xiong, H., Mei, Q., Zhao, Y. (2019). Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments. IEEE Systems Journal. https://doi.org/10.1109/JSYST.2018.2890126.
 
Xiong, H., Qin, Z. (2015). Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Transactions on Information Forensics and Security, 10(7), 1442–1455.
 
Xiong, H., Qin, Z., Li, F. (2008). An improved certificateless signature scheme secure in the standard model. Fundamenta Informaticae, 88(1–2), 193–206.
 
Yap, W.S., Chow, S.S., Heng, S.H., Goi, B.M. (2007). Security mediated certificateless signatures. In: Applied Cryptography and Network Security. Springer, pp. 459–477.
 
Yap, W.S., Heng, S.H., Goi, B.M. (2006). An efficient certificateless signature scheme. In: Proceedings of Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006, pp. 322–331.
 
Yu, Y., Mu, Y., Wang, G., Xia, Q., Yang, B. (2012). Improved certificateless signature scheme provably secure in the standard model. IET Information Security, 6(2), 102–110.
 
Yuan, Y., Li, D., Tian, L., Zhu, H. (2009). Certificateless signature scheme without random oracles. In: International Conference on Information Security and Assurance. Springer, pp. 31–40.
 
Zhang, Z., Wong, D.S., Xu, J., Feng, D. (2006). Certificateless public-key signature: security model and efficient construction. In: Proceedings of Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, pp. 293–308.
 
Zhang, J., Zhao, X. (2015). An efficient revocable certificateless signature scheme. In: Fuzzy Systems and Knowledge Discovery, 12th International Conference, FSKD 2015. IEEE, pp. 1852–1857.
 
Zheng, Q., Li, Q., Azgin, A., Weng, J. (2017). Data verification in information-centric networking with efficient revocable certificateless signature. In: 2017 IEEE Conference on Communications and Network Security, CNS. IEEE, pp. 1–9.

Biographies

Mei Qian

Q. Mei is currently pursuing her PhD degree from the School of Information and Software Engineering, University of Electronic Science and Technology of China. She received her BS degree from Jiangxi University of Science and Technology, in 2017. Her research interests include certificateless public key cryptography and key-insulated mechanism.

Zhao Yanan

Y. Zhao is currently pursuing her MS degree from the School of Information and Software Engineering, University of Electronic Science and Technology of China. She received her BS degree from Jiangxi University of Science and Technology, in 2017. Her research interests include identity-based public key cryptography.

Xiong Hu
xionghu.uestc@gmail.com

H. Xiong received his PhD degree from University of Electronic Science and Technology of China (UESTC), in 2009. He is now a full-time professor in the UESTC. His research interests include public key cryptography and networks security.


Full article Related articles Cited by PDF XML
Full article Related articles Cited by PDF XML

Copyright
© 2019 Vilnius University
by logo by logo
Open access article under the CC BY license.

Keywords
certificateless signature revocation standard model

Funding
This work was supported in part by the 13th Five-Year Plan of National Cryptography Development Fund for Cryptographic Theory of China under Grant MMJJ20170204, in part by the Fundamental Research Funds for the Central Universities under Grant ZYGX2016J091, the Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems, the Sichuan Science and Technology Project under Grant 2018KZ0007 and in part by the Natural Science Foundation of China under Grants U1401257, 61472064 and 61602096.

Metrics
since January 2020
1412

Article info
views

698

Full article
views

786

PDF
downloads

239

XML
downloads

Export citation

Copy and paste formatted citation
Placeholder

Download citation in file


Share


RSS

INFORMATICA

  • Online ISSN: 1822-8844
  • Print ISSN: 0868-4952
  • Copyright © 2023 Vilnius University

About

  • About journal

For contributors

  • OA Policy
  • Submit your article
  • Instructions for Referees
    •  

    •  

Contact us

  • Institute of Data Science and Digital Technologies
  • Vilnius University

    Akademijos St. 4

    08412 Vilnius, Lithuania

    Phone: (+370 5) 2109 338

    E-mail: informatica@mii.vu.lt

    https://informatica.vu.lt/journal/INFORMATICA
Powered by PubliMill  •  Privacy policy