Informatica logo


Login Register

  1. Home
  2. Issues
  3. Volume 28, Issue 2 (2017)
  4. Generic Construction of Certificate-Base ...

Informatica

Information Submit your article For Referees Help ATTENTION!
  • Article info
  • Full article
  • Related articles
  • Cited by
  • More
    Article info Full article Related articles Cited by

Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security
Volume 28, Issue 2 (2017), pp. 215–235
Wei Gao   Guilin Wang   Kefei Chen   Xueli Wang  

Authors

 
Placeholder
https://doi.org/10.15388/Informatica.2017.127
Pub. online: 1 January 2017      Type: Research Article      Open accessOpen Access

Received
1 July 2015
Accepted
1 November 2016
Published
1 January 2017

Abstract

This paper studies the generic construction of certificate-based signature (CBS) from certificateless signature (CLS). This paper proposes a new generic conversion from CLS to CBS which is more intuitive, simpler, and provably secure without random oracles than the current one. To develop the security proof, we put forth one novel CLS security model which features a previously neglected but nontrivial attack and hence captures the CLS security notion more comprehensively. We show that many existing CLS schemes can be proved secure in the current model by slightly modifying its original security proof. Following this conversion, many provably secure CBS schemes can be constructed from the corresponding existing CLS schemes.

References

 
Al-Riyami, S.S., Paterson, K.G. (2003). Certificateless public key cryptography. In: Proceedings of ASIACRYPT 2003, Lecture Notes in Computer Science, Vol. 2894. Springer, Berlin, pp. 452–473.
 
Al-Riyami, S.S., Paterson, K.G. (2005). CBE from CLE: a generic construction and effiient schemes. In: Proceedings of PKC 2005, Lecture Notes in Computer Science, Vol. 3386. Springer, Berlin, pp. 398–415.
 
Bellare, M., Rogaway, P. (1993). Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of 1st ACM Conference on Computer and Communications Security. ACM Press, pp. 62–73.
 
Canetti, R., Goldreich, O., Halevi, S. (2004). The random oracle methodology, revisited. Journal of ACM, 51(4), 557–594.
 
Choi, K.Y., Park, J.H., Lee, D.H. (2011). A new provably secure certificateless short signature scheme. Computers & Mathematics with Applications, 61(7), 1760–1768.
 
Gentry, C. (2003). Certificate-based signature and the certificate revocation problem. In: Proeedings of EUROCRYPT 2003, Lecture Notes in Computer Science, Vol. 2656. Springer, Berlin, pp. 272–293.
 
Guo, P., Wang, J., Li, B., Lee, S. (2014). A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology, 15(16), 929–936.
 
Huang, X., Susilo, W., Mu, Y., Zhang, F. (2005). On the security of certificateless signature schemes from asiacrypt 2003. In: Proceedings of Cryptology and Network Security 2005, Lecture Notes in Computer Science, Vol. 3810. Springer, Berlin, pp. 13–25.
 
Huang, X., Mu, Y., Susilo, W., Wong, D., Wu, W. (2011). Certificateless signatures: new schemes and security models. The Computer Journal, 55(4), 457–474.
 
Kang, B.G., Park, J.H. (2005). Is it possible to have CBE from CLE? Iacr cryptology print archive. available at eprint.iacr.org/2005/431.ps.
 
Kang, B.G., Park, J.H., Hahn, S.G. (2004). A certificate-based signature scheme. In: Proceedings of CT-RSA 2004, Lecture Notes in Computer Science, Vol. 2964. Springer, Berlin, pp. 99–111.
 
Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q. (2010). Constructions of certificate-based signature secure against key replacement attacks. Journal of Computer Security, 18(3), 421–449.
 
Li, J., Huang, X., Zhang, Y., Xu, L. (2012). An efficient short certificate-based signature scheme. Journal of Systems and Software, 85(2), 314–322.
 
Liu, J.K., Au, M.H., Susilo, W. (2007). Self-generated certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. ACM Press, pp. 273–283.
 
Liu, J.K., Baek, J., Susilo, W., Zhou, J. (2008). Certificate-based signature schemes without pairings or random oracles. In: Proceedings of Information Security Conference 2008, Lecture Notes in Computer Science, Vol. 5222. Springer, Berlin, pp. 285–297.
 
Liu, J.K., Bao, F., Zhou, J. (2011). Short and efficient certificate-based signature. In: Proceedings of Networking Workshops 2011, Lecture Notes in Computer Science, Vol. 2867. Springer, Berlin, pp. 167–178.
 
Lu, Y., Li, J. (2015). Improved certificate-based signature scheme without random oracles. IET Information Security, 10(2), 80–86.
 
Pang, L., Hu, Y., Liu, Y., Xu, K., Li, H. (2015). Efficient and secure certificateless signature scheme in the standard model. International Journal of Communication Systems. https://doi.org/10.1002/dac.3041. Published online in Wiley Online Library (wileyonlinelibrary.com).
 
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In: Proceedings of Crypto 1984, Lecture Notes in Computer Science, Vol. 196. Springer, Berlin, pp. 47–53.
 
Shen, J., Tan, H., Wang, J., Wang, J.W., Lee, S. (2015). A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology, 16(1), 171–178.
 
Waters, B. (2005). Efficient identity-based encryption without random oracles. In: Proceedings of EUROCRYPT 2005, Lecture Notes in Computer Science, Vol. 3494. Springer, Berlin, pp. 114–127.
 
Wu, W., Mu, Y., Susilo, W., Huang, X. (2009). Certificate-based signatures revisited. Journal of Universal Computer Science, 15(8), 1659–1684.
 
Wu, W., Mu, Y., Susilo, W., Huang, X. (2012). Provably secure construction of certificate-based encryption from certificateless encryption. The Computer Journal, 55(10), 1157–1168.
 
Xie, S., Wang, Y. (2014). Construction of tree network with limited delivery latency in homogeneous wireless wensor networks. Wireless Personal Communications, 78(1), 231–246.
 
Zhang, J., Mao, J. (2012). An efficient RSA-based certificateless signature scheme. The Journal of Systems and Software, 85(3), 638–642.
 
Zhang, L., Zhang, F., Zhang, F. (2007). New efficient certificateless signature scheme. In: Proceedings of EUC 2007, Lecture Notes in Computer Science, Vol. 4809. Springer, Berlin, pp. 692–703.

Biographies

Gao Wei
mygaowei@163.com

W. Gao received his PhD and MS degrees in applied mathematics from Hunan University in 2006, Guangzhou University 2003, respectively. He is an associate professor in Ludong University from 2012.

Wang Guilin
wang.guilin@huawei.com

G. Wang received his PhD degree in computer science, from Institute of Software, Chinese Academy of Sciences, PR China, in 2001. He was a senior lecturer in University of Wollongong, Australia. Now he works in Huawei Technologies Co. Ltd., Singapore. His research interests include cryptography and information security.

Chen Kefei
kfchen@hznu.edu.cn

K. Chen is a professor of cryptography and information security school of science, Hangzhou Normal University since 2013. From 1996 to 2013, he was a professor of cryptography and information security in the School of Science, Shanghai Jiaotong University. His interest fields are public key cryptography, cryptographic protocol analysis, applied cryptographic techniques and computer security.

Wang Xueli
wangxuyuyan@gmail.com

X. Wang received his PhD degree in mathematics from the Academy of China in 1991, his MS degree in mathematics from Shannxi Normal University in 1987. He is currently a professor of Computer Science at South China Normal University. His current research interests include cryptography, number theory.


Full article Related articles Cited by PDF XML
Full article Related articles Cited by PDF XML

Copyright
© 2017 Vilnius University
by logo by logo
Open access article under the CC BY license.

Keywords
certificateless signature certificate-based signature identity based signature provable security

Metrics
since January 2020
1051

Article info
views

519

Full article
views

548

PDF
downloads

209

XML
downloads

Export citation

Copy and paste formatted citation
Placeholder

Download citation in file


Share


RSS

INFORMATICA

  • Online ISSN: 1822-8844
  • Print ISSN: 0868-4952
  • Copyright © 2023 Vilnius University

About

  • About journal

For contributors

  • OA Policy
  • Submit your article
  • Instructions for Referees
    •  

    •  

Contact us

  • Institute of Data Science and Digital Technologies
  • Vilnius University

    Akademijos St. 4

    08412 Vilnius, Lithuania

    Phone: (+370 5) 2109 338

    E-mail: informatica@mii.vu.lt

    https://informatica.vu.lt/journal/INFORMATICA
Powered by PubliMill  •  Privacy policy