Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 854135, 11 pages
http://dx.doi.org/10.1155/2014/854135
Research Article

Strongly Secure Certificateless Signature Scheme Supporting Batch Verification

1Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 80424, Taiwan
2Network Benchmarking Lab, Hsinchu 30010, Taiwan

Received 14 November 2013; Revised 7 March 2014; Accepted 13 March 2014; Published 16 April 2014

Academic Editor: Jian Guo Zhou

Copyright © 2014 Chun-I Fan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology-CRYPTO, pp. 47–53, 1985. View at Publisher · View at Google Scholar · View at MathSciNet
  2. B. Libert and J. Quisquater, “What is possible with identity based cryptography for PKIs and what still must be improved,” in Proceedings of the European PKI Workshop (EuroPKI '04), pp. 57–70, 2004.
  3. S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in Advances in Cryptology-ASIACRYPT, pp. 452–473, 2003. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  4. X. Huang, W. Susilo, Y. Mu, and F. Zhang, “On the Security of Certificateless Signature Schemes from Asiacrypt 2003,” in Proceedings of the International Conference on Cryptology and Network Security (CANS '05), pp. 13–25, 2005.
  5. Y. Chen, G. Horng, and C. Liu, “Strong non-repudiation based on certificateless short signatures,” IET Infomation Security, vol. 7, no. 3, pp. 253–263, 2012. View at Google Scholar
  6. K. Y. Choi, J. H. Park, and D. H. Lee, “A new provably secure certificateless short signature scheme,” Computers and Mathematics with Applications, vol. 61, no. 7, pp. 1760–1768, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. L. Cheng and Q. Wen, “A secure and efficient certificateless short signature scheme,” Journal of Engineering Science and Technology Review, vol. 6, no. 2, pp. 35–44, 2011. View at Google Scholar
  8. H. Du and Q. Wen, “Efficient and provably-secure certificateless short signature scheme from bilinear pairings,” Computer Standards and Interfaces, vol. 31, no. 2, pp. 390–394, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. M. Gorantla and A. Saxena, “An efficient certificateless signature scheme,” in Proceedings of International Conference on Computational Intelligence and Security (CIS '05), pp. 110–116, 2005.
  10. X. Li, K. Chen, and L. Sun, “Certificateless signature and proxy signature schemes from bilinear pairings,” Lithuanian Mathematical Journal, vol. 45, no. 1, pp. 76–83, 2005. View at Publisher · View at Google Scholar · View at Scopus
  11. F. Li and P. Liu, “An efficient certificateless signature scheme from bilinear parings,” in Proceedings of the International Conference on Network Computing and Information Security (NCIS '11), pp. 35–37, May 2011. View at Publisher · View at Google Scholar · View at Scopus
  12. R. Tso, X. Huang, and W. Susilo, “Strongly secure certificateless short signatures,” Journal of Systems and Software, vol. 85, no. 6, pp. 1409–1417, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. R. Tso, C. Kim, and X. Yi, “Certificateless message recovery signatures providing Girault's level-3 security,” Journal of Shanghai Jiaotong University (Science), vol. 16, no. 5, pp. 577–585, 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. Z. Wan, “Certificateless directed signature scheme,” in Proceedings of the 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '11), pp. 1–4, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. W. Yap, S. Heng, and B. Goi, “An efficient certificateless signature scheme,” in Proceedings of International Conference on Emerging Directions in Embedded and Ubiquitous Computing (EUC '06), pp. 322–331, 2006.
  16. Y. Yuan and C. Wang, “A secure certificateless signature scheme in the standard model,” Journal of Computational Information Systems, vol. 9, no. 11, pp. 4353–4362, 2013. View at Google Scholar
  17. Z. Zhang, D. Wong, J. Xu, and D. Feng, “Certificateless public-key signature: security model and efficient construction,” in Proceedings of International Conference on Applied Cryptography and Network Securit (ACNS '06), pp. 293–308, 2006.
  18. L. Zhang, Q. Wu, J. Domingo-Ferrer, and B. Qin, “New efficient certificateless signature scheme,” in Proceedings of International Conference on Emerging Directions in Embedded and Ubiquitous Computing (EUC '07), pp. 692–703, 2007. View at Publisher · View at Google Scholar · View at Scopus
  19. B. C. Hu, D. S. Wong, Z. Zhang, and X. Deng, “Certificateless signature: a new security model and an improved generic construction,” Designs, Codes, and Cryptography, vol. 42, no. 2, pp. 109–126, 2007. View at Publisher · View at Google Scholar · View at Scopus
  20. M. Girault, “Self-certified public keys,” in Advances in Cryptology-EUROCRYPT, pp. 490–497, 1991. View at Google Scholar
  21. A. Fiat, “Batch RSA,” in Advances in cryptology-CRYPTO, pp. 175–185, 1990. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  22. C. Boyd and C. Pavlovski, “Attacking and repairing batch verification schemes,” in Advances in cryptology-ASIACRYPT, pp. 58–71, 2000. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  23. L. Harn, “Batch verifying multiple RSA digital signatures,” Electronics Letters, vol. 34, no. 12, pp. 1219–1220, 1998. View at Google Scholar · View at Scopus
  24. D. Naccache, D. M’Raihi, S. Vaudenay, and D. Raphaeli, “Can D. S. A. be improved? Complexity trade-offs with the digital signature standard,” in Advances in Cryptology-EUROCRYPT, pp. 77–85, 1994. View at Google Scholar
  25. H. Yoon, J. H. Cheon, and Y. Kim, “Batch verifications with ID-based signatures,” in Proceedings of International Conference on Information Security and Cryptology (ICISC '04), pp. 233–248, 2004.
  26. M. Bellare and J. Garay, “Fast batch verification for modular exponentiation and digital signatures,” in Advances In Cryptology-EUROCRYPT, pp. 236–250, 1998. View at Google Scholar
  27. C. Shi, D. Pu, and W. C. Choong, “An efficient identity-based signature scheme with batch verifications,” in Proceedings of the 1st International Conference on Scalable information systems (INFOSCALE '06), vol. 22, pp. 1–6, June 2006. View at Publisher · View at Google Scholar · View at Scopus
  28. A. Ferrara, M. Green, S. Hobenberger, and M. Pedersen, “Practical short signature batch verification,” in Proceedings of the The Cryptographers’ Track at the RSA Conference on Topics in Cryptology (CT-RSA '09), pp. 309–324, 2009.
  29. M. Geng and F. Zhang, “Batch verification for certificateless signature schemes,” in Proceedings of the International Conference on Computational Intelligence and Security (CIS '09), pp. 288–292, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  30. X. Qin, S. Zhang, and L. Jia, “Research on pairing-based batch verification,” in Proceedings of the International Conference on Communications and Mobile Computing (CMC '10), pp. 46–50, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  31. C. Zhang, P. Ho, and J. Tapolcai, “On batch verification with group testing for vehicular communications,” Wireless Networks, vol. 17, no. 8, pp. 1851–1865, 2011. View at Publisher · View at Google Scholar · View at Scopus
  32. K. Kim, I. Yie, S. Lim, and D. Nyang, “Batch verification and finding invalid signatures in a group signature scheme,” International Journal of Network Security, vol. 13, no. 2, pp. 61–70, 2011. View at Google Scholar · View at Scopus
  33. A. Wasef and X. Shen, “Efficient group signature scheme supporting batch verification for securing vehicular networks,” in Proceedings of the IEEE International Conference on Communications (ICC '10), pp. 1–5, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  34. L. Wei, J. Liu, and T. Zhu, “On a group signature scheme supporting batch verification for vehicular networks,” in Proceedings of the 3rd International Conference on Multimedia Information Networking and Security (MINES '11), pp. 436–440, November 2011. View at Publisher · View at Google Scholar · View at Scopus
  35. J. Camenisch, S. Hohenberger, and M. Pedersen, “Batch verification of short signature,” in Proceedings of the Advances in Cryptology-(EUROCRYPT '07), pp. 246–263, 2007.
  36. T. Cao, D. Lin, and R. Xue, “Security analysis of some batch verifying signatures from pairings,” International Journal of Network Security, vol. 3, no. 2, pp. 138–143, 2006. View at Google Scholar
  37. F. Guo, Y. Mu, and Z. Chen, “Efficient batch verification of short signatures for a single-signer setting without random oracles,” in Proceedings of the International Workshop on Security (IWSEC '08), pp. 49–63, 2008.
  38. M. Hwang, C. Lee, and Y. Tang, “Two simple batch verifying multiple digital signatures,” in Proceedings of International Conference on Information and Communications Security (ICICS '01), pp. 233–237, 2001.
  39. S. Yen and C. Laih, “Improved digital signature suitable for batch verification,” IEEE Transactions on Computers, vol. 44, no. 7, pp. 957–959, 1995. View at Publisher · View at Google Scholar · View at Scopus
  40. D. Pointcheval and J. Stern, “Security proofs for signature schemes,” in Advances in Cryptology-EUROCRYPT, pp. 387–398, 1996. View at Publisher · View at Google Scholar · View at MathSciNet
  41. N. Koblitz, A. Menezes, and S. Vanstone, “The state of elliptic curve cryptography,” Designs, Codes, and Cryptography, vol. 19, no. 2-3, pp. 173–193, 2000. View at Google Scholar · View at Scopus
  42. A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, LLC, Boca Raton, Fla, USA, 1997. View at MathSciNet
  43. Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Securing mobile ad hoc networks with certificateless public keys,” IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 386–399, 2006. View at Publisher · View at Google Scholar · View at Scopus