Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2014 (2014), Article ID 792063, 6 pages
http://dx.doi.org/10.1155/2014/792063
Research Article

Pairing-Free Certificateless Signature with Security Proof

Hangzhou Key Laboratory of Cryptography and Network Security, Hangzhou Normal University, Hangzhou, Zhejiang 311121, China

Received 30 May 2014; Revised 6 November 2014; Accepted 6 November 2014; Published 26 November 2014

Academic Editor: Tzonelih Hwang

Copyright © 2014 Wenhao Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. S. Al-Riyami and K. Paterson, “Certificateless public key cryptography,” in Advances in Cryptology-ASIACRYPT 2003, vol. 2894 of Lecture Notes in Computer Science, pp. 452–473, Springer, Berlin, Germany, 2003. View at Publisher · View at Google Scholar
  2. X. Huang, W. Susilo, Y. Mu, and F. Zhang, “On the security of certificateless signature schemes from Asiacrypt 2003,” in Cryptology and Network Security, vol. 3810 of Lecture Notes in Computer Science, pp. 13–25, 2005. View at Publisher · View at Google Scholar
  3. D. H. Yum and P. J. Lee, “Generic construction of certificateless signature,” in Information Security and Privacy: 9th Australasian Conference (ACISP '04), vol. 3108 of Lecture Notes in Computer Science, pp. 200–211, Springer, 2004. View at Google Scholar
  4. B. Hu, D. Wong, Z. Zhang, and X. Deng, “Key replacement attack against a generic construction of certificateless signature,” in Proceedings of the 11th Australasian Conference on Information Security and Privacy, pp. 235–246, Melbourne, Australia, 2006.
  5. M. C. Gorantla and A. Saxena, “An efficient certificateless signature scheme,” in Computational Intelligence and Security (CIS '05), vol. 3802 of Lecture Notes in Computer Science, pp. 110–116, Springer, 3802, 2005. View at Google Scholar
  6. X. Cao, K. G. Paterson, and W. Kou, “An attack on a certificateless signature scheme,” Cryptology ePrint Archive: Report 2006/367, 2006. View at Google Scholar
  7. W. Yap, S. Heng, and B. Goi, “An efficient certificateless signature scheme,” in Proceedings of Emerging Directions in Embedded and Ubiquitious Computing, pp. 322–331, 2006.
  8. J. Park and B. Kang, “Security analysis of the certificateless signature scheme proposed at Sec Ubiq 2006,” in Emerging Directions in Embedded and Ubiquitous Computing, vol. 4809 of Lecture Notes in Computer Science, pp. 686–691, Springer, Berlin, Germany, 2007. View at Google Scholar
  9. L. Zhang, F. Zhang, and F. Zhang, “New efficient certificateless signature scheme,” in Emerging Directions in Embedded and Ubiquitous Computing, vol. 4809 of Lecture Notes in Computer Science, pp. 692–703, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar
  10. Z. Zhang, D. Wong, J. Xu, and D. Feng, “Certificateless public-key signature: security model and efficient construction,” in Applied Cryptography and Network Security, vol. 3989 of Lecture Notes in Computer Science, pp. 293–308, Springer, Berlin, Germany, 2006. View at Google Scholar
  11. K. Y. Choi, J. H. Park, J. Y. Hwang, and D. H. Lee, “Efficient certificateless signature schemes,” in Applied Cryptography and Network Security, vol. 4521 of Lecture Notes in Computer Science, pp. 443–458, Springer, New York, NY, USA, 2007. View at Publisher · View at Google Scholar
  12. S. Duan, “Certificateless undeniable signature scheme,” Information Sciences, vol. 178, no. 3, pp. 742–755, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  13. J. K. Liu, M. H. Au, and W. Susilo, “Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model,” in Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS '07), pp. 273–283, Singapore, March 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. H. Xiong, Z. Qin, and F. Li, “An improved certificateless signature scheme secure in the standard model,” Fundamenta Informaticae, vol. 88, no. 1-2, pp. 193–206, 2008. View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  15. Y. Yuan, D. Li, L. Tian, and H. Zhu, “Certificateless signature scheme without random oracles,” in Advances in Information Security and Assurance: Proceedings of the 3rd International Conference and Workshops, ISA 2009, Seoul, Korea, June 25–27, 2009, vol. 5576 of Lecture Notes in Computer Science, pp. 31–40, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  16. X. Huang, W. Susilo, and D. Wong, “Certificateless signature revisited,” in Information Security and Privacy, vol. 4586 of Lecture Notes in Computer Science, pp. 308–322, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar
  17. H. Du and Q. Wen, “Efficient and provably-secure certificateless short signature scheme from bilinear pairings,” Computer Standards and Interfaces, vol. 31, no. 2, pp. 390–394, 2009. View at Publisher · View at Google Scholar · View at Scopus
  18. K. Y. Choi, J. H. Park, and D. H. Lee, “A new provably secure certificateless short signature scheme,” Computers & Mathematics with Applications, vol. 61, no. 7, pp. 1760–1768, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  19. K.-A. Shim, “Breaking the short certificateless signature scheme,” Information Sciences, vol. 179, no. 3, pp. 303–306, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  20. L. Chen, Z. Cheng, and N. P. Smart, “Identity-based key agreement protocols from pairings,” International Journal of Information Security, vol. 6, no. 4, pp. 213–241, 2007. View at Publisher · View at Google Scholar · View at Scopus
  21. D. He, J. Chen, and R. Zhang, “An efficient and provably-secure certificateless signature scheme without bilinear pairings,” International Journal of Communication Systems, vol. 25, no. 11, pp. 1432–1442, 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. M. Tian and L. Huang, “Cryptanalysis of a certificateless signature scheme without pairings,” International Journal of Communication Systems, vol. 26, no. 11, pp. 1375–1381, 2013. View at Publisher · View at Google Scholar
  23. J. L. Tsai, N. W. Lo, and T. C. Wu, “Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings,” International Journal of Communication Systems, vol. 27, no. 7, pp. 1083–1090, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. P. Gong and P. Li, “Further improvement of a certificateless signature scheme without pairing,” International Journal of Communication Systems, vol. 27, no. 10, pp. 2083–2091, 2014. View at Publisher · View at Google Scholar · View at Scopus
  25. K.-H. Yeh, K.-Y. Tsai, and C.-Y. Fan, “An efficient certificateless signature scheme without bilinear pairings,” Multimedia Tools and Applications, 2014. View at Publisher · View at Google Scholar