You are not logged in.

Certificate-based signatures: New definitions and a generic construction from certificateless signatures

Wu, Wei, Mu, Yi, Susilo, Willy and Huang, Xinyi 2009, Certificate-based signatures: New definitions and a generic construction from certificateless signatures. In Chung, Kyo-Il, Sohn, Kiwook and Yung, Moti (ed), Information security applications : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008 :revised selected papers, Springer, Berlin, Germany, pp.99-114, doi: 10.1007/978-3-642-00306-6_8.

Attached Files
Name Description MIMEType Size Downloads

Title Certificate-based signatures: New definitions and a generic construction from certificateless signatures
Author(s) Wu, Wei
Mu, Yi
Susilo, Willy
Huang, Xinyi
Title of book Information security applications : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008 :revised selected papers
Editor(s) Chung, Kyo-Il
Sohn, Kiwook
Yung, Moti
Publication date 2009
Series Lecture notes in computer science ; 5379
Chapter number 1
Total chapters 1
Start page 99
End page 114
Total pages 16
Publisher Springer
Place of Publication Berlin, Germany
Keyword(s) certificate-based
certificateless
security models
generic construction
Summary Certificate-based encryption was introduced in Eurocrypt’03 to solve the certificate management problem in public key encryption. Recently, this idea has been extended to certificate-based signatures. To date, several new schemes and security models of certificate-based signatures have been proposed. In this paper, we first introduce a new security model of certificate-based signatures. Our model is not only more elaborated when compared with the existing ones, but also defines several new types of adversaries in certificate-based signatures. We then investigate the relationship between certificate-based signatures and certificateless signatures, by proposing a generic construction of certificate-based signatures from certificateless signatures. Our generic construction is secure (in the random oracle model) under the security model defined in this paper, assuming the underlying certificateless signatures satisfying certain security notions.
ISBN 3642003052
9783642003066
Language eng
DOI 10.1007/978-3-642-00306-6_8
Field of Research 109999 Technology not elsewhere classified
Socio Economic Objective 970110 Expanding Knowledge in Technology
HERDC Research category B1.1 Book chapter
Copyright notice ©2009, Springer
Persistent URL http://hdl.handle.net/10536/DRO/DU:30064177

Document type: Book Chapter
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 59 Abstract Views, 4 File Downloads  -  Detailed Statistics
Created: Wed, 11 Jun 2014, 12:35:18 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.