JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2019, Vol. 54 ›› Issue (1): 79-87.doi: 10.6040/j.issn.1671-9352.2.2018.056

Previous Articles    

A certificate-based short signature scheme

ZUO Li-ming1,2,3, CHEN Lan-lan1,3, ZHOU Qing1,3   

  1. 1. School of Science, East China Jiaotong University, Nanchang 330013, Jiangxi, China;
    2. Collaborative Innovation Center for Economics Crime Investigation and Prevention Technology, Jiangxi Province, Nanchang 330013, Jiangxi, China;
    3. SEC Institute, East China Jiaotong University, Nanchang 330013, Jiangxi, China
  • Published:2019-01-23

Abstract: Combining the merits of certificate-based public key cryptography and short signatures, a certificate-based short signature scheme was proposed. Firstly, based on the k-CAA problem and Inv-CDH problem, the security of the scheme was proved in the random oracle model. Then, the signature scheme was compared with several schemes in the efficiency, theoretically. Finally, the signature scheme was implemented by the PBC library and was compared with several typical schemes in the actual operating efficiency. The result shows that the average time consumption is reduced by about 24.7% and 17.5% compared with the certificate-based Lius scheme with bilinear pairings and the certificate-based Lis short signature scheme respectively, which is close to the certificate-based Lis and Zhous schemes without bilinear pairings and Bonehs short signature scheme.

Key words: certificate-based public key cryptography, short signature, collusion attack algorithm with k traitors, inverse computational Diffie-Hellman, random oracle model

CLC Number: 

  • TP309.7
[1] GENTRY C. Certificate-based encryption and the certificate revocation problem[C] // International Conference on Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2003: 272-293.
[2] KANG B, PARK J, HAHN S. A certificate-based signature scheme[C] // Cryptolograheres Track Research Conference Held at the RSA Conference. New York: Springer, 2004: 99-111.
[3] LIU J K, BAEK J, SUSILO W, et al. Certificate-based signature schemes without pairings or random oracles[C] // Proceedings of the ISC 2008. Berlin: Springer, 2008: 285-297.
[4] ZHANG J H. On the security of a certificate-based signature scheme and its improvement with pairings[C] // Proceedings of the ISPEC 2009. Berlin: Springer, 2009: 47-58.
[5] 周萍, 何大可. 高效不含双线性对的基于证书签名方案[J]. 计算机应用研究, 2013, 30(5):1504-1507, 1519. ZHOU Ping, HE Dake. Efficient certificate-based signature scheme without pairings[J]. Application Research of Computers, 2013, 30(5):1504-1507, 1519.
[6] HUANG R, NONG Q. An efficient certificate-based verifiable encrypted signature scheme sithout pairings[J]. Journal of Computer Applications, 2014, 13(3/4): 257-267.
[7] ZHANG Y C, LI J G, WANG Z W, et al. A new efficient certificate-based signature scheme[J]. Chinese Journal of Electronics, 2015, 24(04):776-782.
[8] YANG L, LI J. Improved certificate-based signature scheme without random oracles[J]. IET Information Security, 2016, 10(2):80-86.
[9] ZHOU C, CUI Z. Certificate-based signature scheme in the standard model[J]. IET Information Security, 2017, 11(5):256-260.
[10] BONEH D, LYNN B, SHACHAM H. Short signatures from the Weil pairing[C] // Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin: Springer, 2001: 514-532.
[11] LI J G, HUANG X Y, ZHANG Y C, et al. An efficient short certificate-based signature scheme[J]. Journal of Systems & Software, 2012, 85(2):314-322.
[12] WU W, MU Y, SUSILO W. Certificate-based signatures: new definitions and a generic construction from certificateless signatures[C] // Lecture Notes in Computer Science, Vol5379, Berlin: Springer, 2009: 99-114.
[13] 李志敏, 徐馨, 李存华. 高效的基于证书数字签名设计方案[J]. 计算机应用研究, 2012, 29(4):1430-1433, 1444. LI Zhimin, XU Xin, LI Cunhua. Design of efficient certificate-based signature[J]. Application Research of Computers, 2012, 29(4):1430-1433, 1444.
[14] LI J G, WANG Z W, ZHANG Y C. Provably secure certificate-based signature scheme without pairings[J]. Information Sciences, 2013, 233(7):313-320.
[15] 周萍, 何大可, 张文芳. 具有强安全性不含双线性对的基于证书盲签名[J]. 四川大学学报(工程科学版), 2013, 45(4):111-116. ZHOU Ping, HE Dake, ZHANG Wenfang. Strongly secure certificate-based blind signature scheme without pairings[J]. Journal of Sichuan University(Engineering Science Edition), 2013, 45(4):111-116.
[16] 冯达, 王强, 赵译文, 等. 基于SGX的证书可信性验证与软件安全签发系统[J]. 信息网络安全, 2018(3):63-69. FENG Da, WANG Qiang, ZHAO Yiwen, et al. SGX-based certificate credibility verification and secure software issuance system[J]. Netinfo Security, 2018(3):63-69.
[1] FAN Ai-wan, XIA Dong-liang, YANG Zhao-feng. Security analysis and improvement of two certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(09): 42-48.
[2] YAN Zhao-xiang. Chosen cipher-text security proof of ZS encryption scheme [J]. J4, 2010, 45(11): 115-121.
[3] LIU Xiao-dong,JIANG Ya-li,LI Da-xing . Two biometric identities based signature schemes [J]. J4, 2007, 42(12): 24-28 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!