期刊文献+

Certificateless Message Recovery Signatures Providing Girault's Level-3 Security 被引量:2

Certificateless Message Recovery Signatures Providing Girault’s Level-3 Security
原文传递
导出
摘要 A digital signature with message recovery is a signature that the message itself (or partial of the message) is not required to be transmitted together with the signature. It has the advantage of small data size of communication comparing with the traditional digital signatures. In this paper, combining both advantages of the message recovery signatures and the certificateless cryptography, we propose the first certificatelss signature scheme with message recovery. The remarkable feature of our scheme is that it can achieve Girault's Level-3 security while the conventional certificateless signature scheme only achieves Level-2 security. The security of the scheme is rigorously proved in the random oracle model based on the hardness of the k bilinear Diffie-Hellman inverse (k-BDHI) problem. A digital signature with message recovery is a signature that the message itself (or partial of the message) is not required to be transmitted together with the signature. It has the advantage of small data size of communication comparing with the traditional digital signatures. In this paper, combining both advantages of the message recovery signatures and the certificateless cryptography, we propose the first certificatelss signature scheme with message recovery. The remarkable feature of our scheme is that it can achieve Girault's Level-3 security while the conventional certificateless signature scheme only achieves Level-2 security. The security of the scheme is rigorously proved in the random oracle model based on the hardness of the k bilinear Diffie-Hellman inverse (k-BDHI) problem.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期577-585,共9页 上海交通大学学报(英文版)
关键词 bilinear pairing CERTIFICATELESS digital signature message recovery random oracle bilinear pairing, certificateless, digital signature, message recovery, random oracle
  • 相关文献

参考文献22

  • 1ABE M, OKAMOTO T. A signature scheme with mes- sage recovery as secure as discrete logarithm [J]. Lec- ture Notes in Computer Science, 1999, 1716: 378-389.
  • 2International standard IEC61000-4-2,Edition1.2.2001.
  • 3TSO R, Gu C, OKAMOTO T, et al. Efficient; ID-based digital signatures with message recovery [J]. Lecture Notes in Computer Science, 2007, 4856: 47-59.
  • 4DAVID P,MARTIN A.ESD:waveform calculation,field and current of human and simulator ESD.J.Electrostatics,1996(38):31.
  • 5KANAGAWA.ESD simulator ESS series brochure.Noise Laboratory Co.,Ltd.,Japan.
  • 6SHAMIR A. Identity-based cryptosystems and signa- ture schemes [J]. Lecture Notes in Computer Science, 1984, 0196: 47-53.
  • 7Hu B C, WONG D S, ZHANG Z, et al. Certificate- less signature: A new security model and an improved generic construction [J]. International Journal of De- signs, Codes and Cryptography, 2007, 42(2): 109-126.
  • 8HUANG X, Mu Y, SUSILO W, et al. Certificateless sig- nature revisited [J]. Lecture Notes in Computer Sci- ence, 2007, 4586: 308-322.
  • 9Tso R, YI X, HUANG X. Efficient and short certifi- cateless signatures [J]. Lecture Notes in Computer Sci- ence, 2008, 5339: 64-79.
  • 10YAP W L, HENG S H, GoI B M. An efficient certificte- less signature [J]. Lecture Notes in Computer Science, 206, 4097: 322-331.

共引文献1

同被引文献26

  • 1AL-RIYAMI S S, PATERSON K G. Certificateless public key cryp- tography[A]. Proc of Asiacrypt 2003[C]. Springer-Verlag, Berlin, 2003.452-473.
  • 2CHOI K Y, PARK J H, HWANG J Y, et al. Efficient certificateless signature schemes[A]. Proc of the ACNS 2007 LNCS 4521[C]. Hei- delberg: Springer-Verlag, 2007.443-458.
  • 3HARN L, REN J, L1N C L. Design of DL-basedcertificateless digital signatures[J]. Journal of Systems and Software, 2009,82(5):789-793.
  • 4LIPPOLD G, BOYD C, N1ETO J M G. Efficient certificateless KEM in the standard model[A]. Proc of the ICISC 2009 LNCS 5984[C]. Heidelberg: Springer-Verlag, 2010.34-46.
  • 5HUANG X, MU Y, SUSILO W, et al. Certificateless signatures: new schemes and security models[J]. The Computer Journal, 2012, 55(4): 457-474.
  • 6HU B, WONG D, ZHANG Z, et al. Key replacement attack against a generic construction of certificateless signature[A]. Proc of the llth Australasian Conference on Information Security and Privacy[C]. Mel-bourne, Australia, 2006. 235-246.
  • 7YAP W S, HENG S H, GOI B M. An efficient certificateless signa-ture scheme[A]. Emerging Directions in Embedded and Ubiqui- ous Computing: EUC 2006, LNCS 4097[C]. Berlin: Springer-Verlag, 2006.322-331.
  • 8. L1 J G, HUANG X Y, MU Y, et aLCryptanalysis and improvement of an efficient certificateless signature scheme[J]. Journal of Communi- cations and Networks, 2008,10( 1 ): 10-17.
  • 9TIAN M, HUAN L. Cryptanalysis of a certificateless signature sche- mewithout pairings[EB/OL].http://onlinelibrary.wiley.com/doi/ 10.1002/ dac.2310/full,2012.
  • 10HE D, CHEN J, ZHANG R. An efficient and provably-secure certifi- cateless signature scheme without bilinear pairings[J]. International Journal of Communication Systems, 2012, 25(11): 1432-1442.

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部