You are not logged in.
Openly accessible

Certificate-based signatures revisited

Wu, Wei, Mu, Yi, Susilo, Willy and Huang, Xinyi 2009, Certificate-based signatures revisited, Journal of universal computer science, vol. 15, no. 8, pp. 1659-1684, doi: 10.3217/jucs-015-08-1659.

Attached Files
Name Description MIMEType Size Downloads
huang-certificatebased-2009.pdf Published version application/pdf 409.19KB 36

Title Certificate-based signatures revisited
Author(s) Wu, Wei
Mu, Yi
Susilo, Willy
Huang, Xinyi
Journal name Journal of universal computer science
Volume number 15
Issue number 8
Start page 1659
End page 1684
Total pages 26
Publisher Common Ground Publishing
Place of publication Melbourne, Vic.
Publication date 2009
ISSN 1833-1882
Keyword(s) certificate-based signatures
certificate signatures
security model
generic construction
concrete scheme
Summary Certificate-based encryption was introduced in Eurocrypt '03 to solve the certificate management problem in public key encryption. Recently, this idea was extended to certificate-based signatures. Several new schemes and security models of certificate-based signature by comparing it with digital signatures in other popular public key systems. We introduce a new security model of certificate-based signature, which defines several new types of adversaries against certificate-based signature, which defines several new types of adversaries against certificate-based signatures, along with the security model of certificate-based signatures against them. The new model is clearer and more elaborated compared with other existing ones. We then investigate the relationship between certificate-based signatures and certificate-less signatures, and propose a generic construction of certificate-based signatures and certificate less signatures, and propose a generic construction of certificate-based signatures. We prove that the generic construction is secure (in the random oracle model) against all types of adversaries defined in this paper, assuming the underlying certificateless signatures satisfying certain security notions. Based on our generic construction, we are able to construct new certificate-based signatures schemes, which are more effiecient in comparison with other schemes with similar security levels
Language eng
DOI 10.3217/jucs-015-08-1659
Field of Research 109999 Technology not elsewhere classified
Socio Economic Objective 970110 Expanding Knowledge in Technology
HERDC Research category C1.1 Refereed article in a scholarly journal
Copyright notice ©2009, Common Ground Publishing
Persistent URL http://hdl.handle.net/10536/DRO/DU:30064397

Document type: Journal Article
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 19 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 42 Abstract Views, 36 File Downloads  -  Detailed Statistics
Created: Fri, 13 Jun 2014, 12:10:53 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.