Open Access Open Access  Restricted Access Subscription or Fee Access

An Efficient Digital Signature Scheme

G. Jai Arul Jose, C. Sajeev, Dr.C. Suyambulingom

Abstract


Cryptographic techniques, such as encipherment,
igital signatures, key management and secret sharing schemes, are important building blocks in the implementation of all security services. In situations where there is not complete trust between sender and receiver, something more than authentication is needed. The most attractive solution to this problem is the digital signature. In
2003, Al-Riyami and Paterson proposed the certificateless public key cryptography which is intermediate between traditional certificate public key cryptography and Identity based public key cryptography. In this paper, we propose a new certificateless signature scheme from bilinear pairings. The proposed scheme is much more efficient than
those previous certificateless signature schemes. In the signing phase, no bilinear pairing operations are needed, and in the verifying phase, only two bilinear pairing operations are needed. All this contributes
to the efficiency of the proposed scheme. The proposed scheme is unforgeable under the hardness assumptions of the q-strong Diffie-Hellman problem and the computational Diffie-Hellman problem.


Keywords


Public Key Cryptography, Digital Signature, Bilinear Pairing, Digital Certificate.

Full Text:

PDF

References


S. S. Al-Riyami, K. G. Paterson, Certificateless Public Key

Cryptography. In Proc. Asiacrypt’03, LNCS 2784, Springer Verlag.

Lecture Notes in Computer Science Series, 2003.

A. Shamir, Identity-based cryptosystems and signature schemes,

Proceedings of Crypto'84, LNCS 196, pp. 47-53, Springer-Verlag, 1985.

P. S. L. M. Barreto, “Efficient and provably-secure identity-based

signatures and signcryption from bilinear maps,” in Proceedings of

Asiacrypt'2005, LNCS 3788, pp. 515-532, Springer-Verlag, 2005.

D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the weil

pairings, in Proceedings of Asiacrypt'01,” LNCS 2248, pp. 514-532,

Springer-Verlag, 2001.

F. Hess, “Efficient identity based signature scheme based on pairings,”

Selected Areas in Cryptography-SAC 2002, LNCS 2595, pp. 310-324,

Springer-Verlag, 2003.

X. Li, K. Chen, and L. Sun, “Certificateless signature and proxy

signature schemes from bilinear pairings,” Lithuanian Mathematical

Journal, vol. 45, no. 1, pp.95-103, 2005.

D. Yum and P. Lee, Generic construction of certificateless signature,

Proceedings of ACISP'04, LNCS 3108, pp. 200-211, 2004.

Zhang Z, Wong D, Xu J, and Feng D. “Certificateless public-key

signature: security model and efficient construction,” in Proceedings of

the ACNS 2006. Singapore, 2006: 293-308.

Zhang L, Zhang F, and Zhang F. “New efficient certificateless signature

scheme”, Proceedings of the EUC Workshops 2007. Taipei, China,

: 692-703.

Zhang Lei and Zhang Fu-tai, “A Method to Construct a Class of

Certificateless Signature Schemes,” Chinese Journal of Computers, vol.

, no. 5, pp.940-945, 2009.

William Stallings, “Cryptography and Network Security: Principles and

Practice”. PHI.

Bruce Schneier, Applied Cryptography”, John Willy and Sons.

A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone. “Handbook of

Applied Cryptography”. CRC Press, 1996.

D.R. Stinson. “Cryptography theory and practice”. CRC Press, 1995.

Szor, P. The Art of Computer Virus Research and Defense. Reading,

MA: Addison-Wesley, 2005.

Lewand, R. Cryptological Mathematics. Washington, DC: Mathematical

Association of America, 2000.

M.O. Rabin, “Digitalized signatures,” in “Foundations of Secure

Computation,”R. Lipton and R. DeMillo, Eds., Academic Press, New

York, 1978, pp. 155-166.

P. Flajolet and A.M. Odlyzko, “Random mapping statistics,” Advances

in Cryptology, Proc. Eurocrypt’89, LNCS.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.