Skip to main content
Top

2017 | OriginalPaper | Chapter

An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA

Authors : Liangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi, Yu Long

Published in: Cyberspace Safety and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Through the application of certificateless signature, certificate management in traditional signatures can be simplified. Furthermore, the key escrow problem in identity-based signatures can be solved as well. As history has shown, there has not been a general pairing-free certificateless signature scheme which is mainly designed with modular exponentiation and modular multiplication that can possess resistance to Type I and Type II adversaries so far. Therefore, a new hard mathematic problem is firstly defined in this paper, which is called variant of RSA problem. In the next step, a new general pairing-free certificateless signature scheme is proposed based on the newly defined variant of RSA problem and the well known discrete logarithm problem. Fortunately, the proposed scheme is also the first RSA-based certificateless signature scheme that can possess resistance to Type I and Type II adversaries. In addition, a formal security proof is provided to demonstrate that, under adaptively chosen message attacks, the proposed scheme is provably secure against Type I and Type II adversaries in the random oracle model. When compared with other known pairing-free certificateless signature schemes of the same type, the computation cost of our scheme is slightly higher, however, a higher security level can be achieved.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
4.
go back to reference Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the security of certificateless signature schemes from asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 13–25. Springer, Heidelberg (2005). doi:10.1007/11599371_2 CrossRef Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the security of certificateless signature schemes from asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 13–25. Springer, Heidelberg (2005). doi:10.​1007/​11599371_​2 CrossRef
5.
go back to reference Li, X.-X., Chen, K.-F., Sun, L.: Certificateless signature and proxy signature schemes from bilinear pairings. Lith. Math. J. 45(1), 76–83 (2005)CrossRefMATHMathSciNet Li, X.-X., Chen, K.-F., Sun, L.: Certificateless signature and proxy signature schemes from bilinear pairings. Lith. Math. J. 45(1), 76–83 (2005)CrossRefMATHMathSciNet
6.
go back to reference Gorantla, M.C., Saxena, A.: An efficient certificateless signature scheme. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS, vol. 3802, pp. 110–116. Springer, Heidelberg (2005). doi:10.1007/11596981_16 CrossRef Gorantla, M.C., Saxena, A.: An efficient certificateless signature scheme. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS, vol. 3802, pp. 110–116. Springer, Heidelberg (2005). doi:10.​1007/​11596981_​16 CrossRef
7.
go back to reference Yap, W.-S., Heng, S.-H., Goi, B.-M.: An efficient certificateless signature scheme. In: Zhou, X., et al. (eds.) EUC 2006. LNCS, vol. 4097, pp. 322–331. Springer, Heidelberg (2006). doi:10.1007/11807964_33 CrossRef Yap, W.-S., Heng, S.-H., Goi, B.-M.: An efficient certificateless signature scheme. In: Zhou, X., et al. (eds.) EUC 2006. LNCS, vol. 4097, pp. 322–331. Springer, Heidelberg (2006). doi:10.​1007/​11807964_​33 CrossRef
8.
9.
go back to reference Cao, X., Paterson, K.G., Kou, W.: An attack on a certificateless signature scheme, IACR Cryptology ePrint Archive 2006, 367 (2006) Cao, X., Paterson, K.G., Kou, W.: An attack on a certificateless signature scheme, IACR Cryptology ePrint Archive 2006, 367 (2006)
10.
go back to reference Park, J.H.: An attack on the certificateless signature scheme from euc workshops 2006. IACR Cryptology ePrint Archive 2006, 442 (2006) Park, J.H.: An attack on the certificateless signature scheme from euc workshops 2006. IACR Cryptology ePrint Archive 2006, 442 (2006)
11.
go back to reference Zhang, J., Mao, J.: Security analysis of two signature schemes and their improved schemes. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007. LNCS, vol. 4705, pp. 589–602. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74472-6_48 CrossRef Zhang, J., Mao, J.: Security analysis of two signature schemes and their improved schemes. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007. LNCS, vol. 4705, pp. 589–602. Springer, Heidelberg (2007). doi:10.​1007/​978-3-540-74472-6_​48 CrossRef
12.
go back to reference Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Key replacement attack against a generic construction of certificateless signature. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 235–246. Springer, Heidelberg (2006). doi:10.1007/11780656_20 CrossRef Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Key replacement attack against a generic construction of certificateless signature. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 235–246. Springer, Heidelberg (2006). doi:10.​1007/​11780656_​20 CrossRef
13.
go back to reference Zhang, Z., Wong, D.S., Xu, J., Feng, D.: Certificateless public-key signature: security model and efficient construction. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 293–308. Springer, Heidelberg (2006). doi:10.1007/11767480_20 CrossRef Zhang, Z., Wong, D.S., Xu, J., Feng, D.: Certificateless public-key signature: security model and efficient construction. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 293–308. Springer, Heidelberg (2006). doi:10.​1007/​11767480_​20 CrossRef
14.
go back to reference Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signature revisited. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 308–322. Springer, Heidelberg (2007). doi:10.1007/978-3-540-73458-1_23 CrossRef Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signature revisited. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 308–322. Springer, Heidelberg (2007). doi:10.​1007/​978-3-540-73458-1_​23 CrossRef
15.
go back to reference He, D., Chen, J., Zhang, R.: An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int. J. Commun. Syst. 25(11), 1432–1442 (2012)CrossRef He, D., Chen, J., Zhang, R.: An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int. J. Commun. Syst. 25(11), 1432–1442 (2012)CrossRef
16.
go back to reference Tian, M., Huang, L.: Cryptanalysis of a certificateless signature scheme without pairings. Int. J. Commun. Syst. 26(11), 1375–1381 (2013)CrossRef Tian, M., Huang, L.: Cryptanalysis of a certificateless signature scheme without pairings. Int. J. Commun. Syst. 26(11), 1375–1381 (2013)CrossRef
17.
go back to reference Tsai, J.-L., Lo, N.-W., Wu, T.-C.: Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. Int. J. Commun. Syst. 27(7), 1083–1090 (2014)CrossRef Tsai, J.-L., Lo, N.-W., Wu, T.-C.: Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. Int. J. Commun. Syst. 27(7), 1083–1090 (2014)CrossRef
18.
go back to reference Gong, P., Li, P.: Further improvement of a certificateless signature scheme without pairing. Int. J. Commun. Syst. 27(10), 2083–2091 (2014)CrossRef Gong, P., Li, P.: Further improvement of a certificateless signature scheme without pairing. Int. J. Commun. Syst. 27(10), 2083–2091 (2014)CrossRef
19.
go back to reference Yeh, K.-H., Tsai, K.-Y., Kuo, R.-Z., Wu, T.-C.: Robust certificateless signature scheme without bilinear pairings. In: 2013 International Conference on IT Convergence and Security (ICITCS), pp. 1–4. IEEE (2013) Yeh, K.-H., Tsai, K.-Y., Kuo, R.-Z., Wu, T.-C.: Robust certificateless signature scheme without bilinear pairings. In: 2013 International Conference on IT Convergence and Security (ICITCS), pp. 1–4. IEEE (2013)
20.
go back to reference Yeh, K.-H., Tsai, K.-Y., Fan, C.-Y.: An efficient certificateless signature scheme without bilinear pairings. Multimedia Tools Appl., 1–12 (2014) Yeh, K.-H., Tsai, K.-Y., Fan, C.-Y.: An efficient certificateless signature scheme without bilinear pairings. Multimedia Tools Appl., 1–12 (2014)
21.
go back to reference Liu, W., Xie, Q., Wang, S., Han, L., Hu, B.: Pairing-free certificateless signature with security proof. J. Comput. Netw. Commun. 2014, 6 (2014) Liu, W., Xie, Q., Wang, S., Han, L., Hu, B.: Pairing-free certificateless signature with security proof. J. Comput. Netw. Commun. 2014, 6 (2014)
22.
go back to reference Harn, L., Ren, J., Lin, C.: Design of dl-based certificateless digital signatures. J. Syst. Softw. 82(5), 789–793 (2009)CrossRef Harn, L., Ren, J., Lin, C.: Design of dl-based certificateless digital signatures. J. Syst. Softw. 82(5), 789–793 (2009)CrossRef
23.
go back to reference Zhang, J., Mao, J.: An efficient rsa-based certificateless signature scheme. J. Syst. Softw. 85(3), 638–642 (2012)CrossRef Zhang, J., Mao, J.: An efficient rsa-based certificateless signature scheme. J. Syst. Softw. 85(3), 638–642 (2012)CrossRef
24.
go back to reference He, D., Khan, M.K., Wu, S.: On the security of a rsa-based certificateless signature scheme. IJ Network Secur. 16(1), 78–80 (2014) He, D., Khan, M.K., Wu, S.: On the security of a rsa-based certificateless signature scheme. IJ Network Secur. 16(1), 78–80 (2014)
25.
go back to reference Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387–398. Springer, Heidelberg (1996). doi:10.1007/3-540-68339-9_33 Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387–398. Springer, Heidelberg (1996). doi:10.​1007/​3-540-68339-9_​33
Metadata
Title
An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA
Authors
Liangliang Wang
Mi Wen
Kefei Chen
Zhongqin Bi
Yu Long
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-69471-9_19

Premium Partner