Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014 (2014), Article ID 728591, 16 pages
http://dx.doi.org/10.1155/2014/728591
Research Article

Secure Certificateless Signature with Revocation in the Standard Model

Department of Mathematics, National Changhua University of Education, Chang-Hua City 500, Taiwan

Received 6 May 2014; Revised 3 September 2014; Accepted 3 October 2014; Published 19 November 2014

Academic Editor: Kwok-Wo Wong

Copyright © 2014 Tung-Tso Tsai et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Proceedings of the 21st Annual International Cryptology Conference (Crypto '01), pp. 213–229, Santa Barbara, Calif, USA, August 2001.
  2. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology: Proceedings of CRYPTO '84, vol. 196 of Lecture Notes in Computer Science, pp. 47–53, Springer, Berlin, Germany, 1985. View at Publisher · View at Google Scholar
  3. J. C. Cha and J. H. Cheon, “An identity-based signature from gap Diffie-Hellman groups,” in Public Key Cryptography—PKC 2003, vol. 2567 of Lecture Notes in Computer Science, pp. 18–30, 2003. View at Publisher · View at Google Scholar
  4. B. Waters, “Efficient identity-based encryption without random oracles,” in Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt '05), pp. 1–33, Aarhus, Denmark, May 2005.
  5. Y.-M. Tseng, T.-Y. Wu, and J.-D. Wu, “An efficient and provably secure id-based signature scheme with batch verifications,” International Journal of Innovative Computing, Information and Control, vol. 5, no. 11, pp. 3911–3922, 2009. View at Google Scholar · View at Scopus
  6. Y. Ren, D. Gu, S. Wang, and X. Zhang, “New fuzzy identity-based encryption in the standard model,” Informatica, vol. 21, no. 3, pp. 393–407, 2010. View at Google Scholar · View at MathSciNet · View at Scopus
  7. J. Li, X. Chen, C. Jia, and W. Lou, “Identity-based encryption with outsourced revocation in cloud computing,” IEEE Transactions on Computers, 2013. View at Publisher · View at Google Scholar
  8. C. Gentry, “Certificate-based encryption and the certificate revocation problem,” in Advances in Cryptology—EUROCRYPT '03, vol. 2656 of Lecture Notes in Computer Science, pp. 272–293, 2003. View at Publisher · View at Google Scholar
  9. S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in Advances in Cryptology—ASIACRYPT 2003, vol. 2894 of Lecture Notes in Computer Science, pp. 452–473, Springer, Berlin, Germany, 2003. View at Google Scholar
  10. S. S. Al-Riyami and K. G. Paterson, “CBE from CL-PKE: a generic construction and efficient schemes,” in Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography (PKC '05), pp. 398–415, Les Diablerets, Switzerland, January 2005.
  11. X. Huang, W. Susilo, Y. Mu, and F. Zhang, “On the security of certificateless signature schemes from Asiacrypt 2003,” in Proceedings of the Cryptology and Network Security (CANS '05), pp. 13–25, 2005.
  12. B. Hu, D. Wong, Z. Zhang, and X. Deng, “Key replacement attack against a generic construction of certificateless signature,” in Information Security and Privacy, vol. 4058 of Lecture Notes in Computer Science, pp. 235–246, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  13. B. Libert and J. J. Quisquater, “On constructing certificateless cryptosystems from identity based encryption,” in Public Key Cryptography—PKC '06, vol. 3958 of Lecture Notes in Computer Science, pp. 474–490, 2006. View at Publisher · View at Google Scholar
  14. X. Huang, Y. Mu, W. Susilo, D. S. Wong, and W. Wu, “Certificateless signature revisited,” in Proceedings of the 12th Australasian Conference (ACISP '07), pp. 308–322, Townsville, Australia, July 2007.
  15. Y. H. Hwang, J. K. Liu, and S. S. Chow, “Certificateless public key encryption secure against malicious KGC attacks in the standard model,” Journal of Universal Computer Science, vol. 14, no. 3, pp. 463–480, 2008. View at Google Scholar · View at MathSciNet · View at Scopus
  16. J. K. Liu, M. H. Au, and W. Susilo, “Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model,” in Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS '07), pp. 273–283, March 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. H. Xiong, Z. Qin, and F. Li, “An improved certificateless signature scheme secure in the standard model,” Fundamenta Informaticae, vol. 88, no. 1-2, pp. 193–206, 2008. View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  18. Y. Yuan, D. Li, L. Tian, and H. Zhu, “Certificateless signature scheme without random oracles,” in Proceedings of the Advances in Information Security and Assurance (ISA '09), pp. 31–40, 2009.
  19. D. Fiore, R. Gennaro, and N. P. Smart, “Constructing certificateless encryption and ID-based encryption from ID-based key agreement,” in Pairing-Based Cryptography—Pairing '10, vol. 6487 of Lecture Notes in Computer Science, pp. 167–186, 2010. View at Publisher · View at Google Scholar
  20. G. Yang and C. H. Tan, “Strongly secure certificateless key exchange without pairing,” in Proceedings of the 6th International Symposium on Information, Computer and Communications Security (ASIACCS '11), pp. 71–79, March 2011. View at Publisher · View at Google Scholar · View at Scopus
  21. Y. Yu, Y. Mu, G. Wang, Q. Xia, and B. Yang, “Improved certificateless signature scheme provably secure in the standard model,” IET Information Security, vol. 6, no. 2, pp. 102–110, 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. T.-T. Tsai and Y.-M. Tseng, “Revocable certificateless public key encryption,” IEEE Systems Journal, 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. D. Yum and P. Lee, “Generic construction of certificateless encryption,” in Proceedings of the International Conference on Computational Science and Its Applications (ICCSA '04 ), pp. 802–811, 2004.
  24. M. C. Gorantla and A. Saxena, “An efficient certificateless signature scheme,” in Proceedings of the International Conference (CIS '05), pp. 110–116, Xi’an, China, December 2005.
  25. X. Cao, K. G. Paterson, and W. Kou, “An attack on a certificateless signature scheme,” Tech. Rep. 2006/367, Cryptology ePrint Archive, 2006, http://eprint.iacr.org/2006/367. View at Google Scholar
  26. J. Zhang and J. Mao, “Security analysis of two signature schemes and their improved schemes,” in Proceedings of the International Conference on Computational Science and Its Applications (ICCSA '07), pp. 589–602, 2007.
  27. L. Zhang and F. Zhang, “A new provably secure certificateless signature scheme,” in Proceedings of the IEEE International Conference on Communications (ICC '08), pp. 1685–1689, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  28. K.-A. Shim, “Breaking the short certificateless signature scheme,” Information Sciences, vol. 179, no. 3, pp. 303–306, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  29. Y. C. Chen, R. Tso, W. Susilo, X. Huang, and G. Horng, “Certificateless signatures: structural extensions of security models and new provably secure schemes,” Tech. Rep. 2013/193, Cryptology ePrint Archive, 2013, http://eprint.iacr.org/2013/193. View at Google Scholar
  30. M. Bellare and P. Rogaway, “Random oracles are practical: a paradigm for designing efficient protocols,” in Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS '93), pp. 62–73, November 1993. View at Scopus
  31. K. G. Paterson and J. C. N. Schuldt, “Efficient identity-based signatures secure in the standard model,” in Information Security and Privacy, vol. 4058 of Lecture Notes in Computer Science, pp. 207–222, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  32. Q. Xia, C. Xu, and Y. Yu, “Key replacement attack on two certificateless signature schemes without random oracles,” Key Engineering Materials, vol. 439-440, pp. 1606–1611, 2010. View at Publisher · View at Google Scholar · View at Scopus
  33. L. Cheng, Q. Wen, Z. P. Jin, and H. Zhang, “On the security of a certificateless signature scheme in the standard model,” Cryptology ePrint Archive Report 2013/153, 2013, https://eprint.iacr.org/2013/153. View at Google Scholar
  34. R. Housley, W. Polk, W. Ford, and D. Solo, “Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile,” RFC 3280, IETF, 2002. View at Google Scholar
  35. L. Shen, F. Zhang, and Y. Sun, “Efficient revocable certificateless encryption secure in the standard model,” The Computer Journal, vol. 57, no. 4, pp. 592–601, 2014. View at Publisher · View at Google Scholar
  36. Y.-M. Tseng and T.-T. Tsai, “Efficient revocable ID-based encryption with a public channel,” Computer Journal, vol. 55, no. 4, pp. 475–486, 2012. View at Publisher · View at Google Scholar · View at Scopus
  37. T.-T. Tsai, Y.-M. Tseng, and T.-Y. Wu, “RHIBE: constructing revocable hierarchical ID-based encryption from HIBE,” Informatica, vol. 25, no. 2, pp. 299–326, 2014. View at Google Scholar · View at MathSciNet