An Efficient Digital Signature Scheme
Abstract
Cryptographic techniques, such as encipherment,
igital signatures, key management and secret sharing schemes, are important building blocks in the implementation of all security services. In situations where there is not complete trust between sender and receiver, something more than authentication is needed. The most attractive solution to this problem is the digital signature. In
2003, Al-Riyami and Paterson proposed the certificateless public key cryptography which is intermediate between traditional certificate public key cryptography and Identity based public key cryptography. In this paper, we propose a new certificateless signature scheme from bilinear pairings. The proposed scheme is much more efficient than
those previous certificateless signature schemes. In the signing phase, no bilinear pairing operations are needed, and in the verifying phase, only two bilinear pairing operations are needed. All this contributes
to the efficiency of the proposed scheme. The proposed scheme is unforgeable under the hardness assumptions of the q-strong Diffie-Hellman problem and the computational Diffie-Hellman problem.
Keywords
Full Text:
PDFReferences
S. S. Al-Riyami, K. G. Paterson, Certificateless Public Key
Cryptography. In Proc. Asiacrypt’03, LNCS 2784, Springer Verlag.
Lecture Notes in Computer Science Series, 2003.
A. Shamir, Identity-based cryptosystems and signature schemes,
Proceedings of Crypto'84, LNCS 196, pp. 47-53, Springer-Verlag, 1985.
P. S. L. M. Barreto, “Efficient and provably-secure identity-based
signatures and signcryption from bilinear maps,” in Proceedings of
Asiacrypt'2005, LNCS 3788, pp. 515-532, Springer-Verlag, 2005.
D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the weil
pairings, in Proceedings of Asiacrypt'01,” LNCS 2248, pp. 514-532,
Springer-Verlag, 2001.
F. Hess, “Efficient identity based signature scheme based on pairings,”
Selected Areas in Cryptography-SAC 2002, LNCS 2595, pp. 310-324,
Springer-Verlag, 2003.
X. Li, K. Chen, and L. Sun, “Certificateless signature and proxy
signature schemes from bilinear pairings,” Lithuanian Mathematical
Journal, vol. 45, no. 1, pp.95-103, 2005.
D. Yum and P. Lee, Generic construction of certificateless signature,
Proceedings of ACISP'04, LNCS 3108, pp. 200-211, 2004.
Zhang Z, Wong D, Xu J, and Feng D. “Certificateless public-key
signature: security model and efficient construction,” in Proceedings of
the ACNS 2006. Singapore, 2006: 293-308.
Zhang L, Zhang F, and Zhang F. “New efficient certificateless signature
scheme”, Proceedings of the EUC Workshops 2007. Taipei, China,
: 692-703.
Zhang Lei and Zhang Fu-tai, “A Method to Construct a Class of
Certificateless Signature Schemes,” Chinese Journal of Computers, vol.
, no. 5, pp.940-945, 2009.
William Stallings, “Cryptography and Network Security: Principles and
Practice”. PHI.
Bruce Schneier, Applied Cryptography”, John Willy and Sons.
A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone. “Handbook of
Applied Cryptography”. CRC Press, 1996.
D.R. Stinson. “Cryptography theory and practice”. CRC Press, 1995.
Szor, P. The Art of Computer Virus Research and Defense. Reading,
MA: Addison-Wesley, 2005.
Lewand, R. Cryptological Mathematics. Washington, DC: Mathematical
Association of America, 2000.
M.O. Rabin, “Digitalized signatures,” in “Foundations of Secure
Computation,”R. Lipton and R. DeMillo, Eds., Academic Press, New
York, 1978, pp. 155-166.
P. Flajolet and A.M. Odlyzko, “Random mapping statistics,” Advances
in Cryptology, Proc. Eurocrypt’89, LNCS.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.