Research Article

Secure Certificateless Signature with Revocation in the Standard Model

Table 1

Comparisons between our scheme and the previously proposed schemes.

Liu et al.’s scheme [16] Xiong et al.’s scheme [17] Yuan et al.’s scheme [18] Yu et al.’s scheme [21] Our scheme

Computational cost for signature 6 6 97 2
Computational cost for verification 6 3 65 7
Against Type I adversary Yes No No No Yes
Against Type II adversary No Yes YesNo Yes
Revocation mechanism No No NoNo Yes
Against Type III adversary Yes
Security assumption NGBDH
Many-DH
NGBDH
Many-DH
AC-DH
2-Many-DH
NGBDH
Many-DH
CDH