You are not logged in.

Certificateless ignatures: New schemes and security models

Huang, Xinyi, Mu, Yi, Susilo, Willy, Wong, Duncan S. and Wu, Wei 2012, Certificateless ignatures: New schemes and security models, Computer journal, vol. 55, no. 4, pp. 457-474, doi: 10.1093/comjnl/bxr097.

Attached Files
Name Description MIMEType Size Downloads

Title Certificateless ignatures: New schemes and security models
Author(s) Huang, Xinyi
Mu, Yi
Susilo, Willy
Wong, Duncan S.
Wu, Wei
Journal name Computer journal
Volume number 55
Issue number 4
Start page 457
End page 474
Total pages 18
Publisher Oxford University Press
Place of publication Oxford, Eng.
Publication date 2012
ISSN 0010-4620
1460-2067
Keyword(s) public-key cryptography
certificateless signatures
security model
Summary We present a study of security in certificateless signatures. We divide potential adversaries according to their attack power, and for the first time, three new kinds of adversaries are introduced into certificateless signatures. They are Normal Adversary, Strong Adversary and Super Adversary (ordered by their attack power). Combined with the known Type I Adversary and Type II Adversary in certificateless cryptography, we then define the security of certificateless signatures in different attack scenarios. Our new security models, together with others in the literature, provide a clear definition of the security in certificateless signatures. Two concrete schemes with different security levels are also proposed in this paper. The first scheme, which is proven secure (in the random oracle model) against Normal Type I and Super Type II adversaries, has the shortest signature length among all known certificateless signature schemes. The second scheme is secure (in the random oracle model) against Super Type I and Type II adversaries. Compared with another scheme that has a similar security level, our second scheme requires less operational cost but a little longer signature length. Two server-aided verification protocols are also proposed to reduce the verification cost on the verifier.
Language eng
DOI 10.1093/comjnl/bxr097
Field of Research 109999 Technology not elsewhere classified
Socio Economic Objective 970110 Expanding Knowledge in Technology
HERDC Research category C1.1 Refereed article in a scholarly journal
Copyright notice ©2012, Oxford University Press
Persistent URL http://hdl.handle.net/10536/DRO/DU:30064416

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 19 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 55 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Fri, 13 Jun 2014, 12:13:01 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.