Certificateless signature and proxy signature schemes from bilinear pairings

被引:64
作者
Li X. [1 ]
Chen K. [1 ]
Sun L. [2 ]
机构
[1] Shanghai Jiaotong University
[2] Nanjing University
关键词
Bilinear pairs; Certificateless public key cryptography; Certificateless signature; Proxy signature;
D O I
10.1007/s10986-005-0008-5
中图分类号
学科分类号
摘要
Due to avoiding the inherent escrow of identity-based cryptography and yet not requiring certificates to guarantee the authenticity of public keys, certificateless public key cryptography has received a significant attention. Due to various applications of bilinear pairings in cryptography, numerous pairing-based encryption schemes, signature schemes, and other cryptographic primitives have been proposed. In this paper, a new certificateless signature scheme based on bilinear pairings is presented. The signing algorithm of the proposed scheme is very simple and does not require any pairing computation. Combining our signature scheme with certificateless public key cryptography yields a complete solution of certificateless public key system. As an application of the proposed signature scheme, a certificateless proxy signature scheme is also presented. We analyze both schemes from security point of view. © 2005 Springer Science+Business Media, Inc.
引用
收藏
页码:76 / 83
页数:7
相关论文
共 16 条
[1]  
Al-Riyami S., Paterson K., Certificateless public key cryptography, LNCS, 2894, pp. 452-473, (2003)
[2]  
Barreto P., Kim H., Lynn B., Scott M., Efficient algorithms for pairing-based cryptosystems, LNCS, 2442, pp. 354-368, (2002)
[3]  
Boneh D., Lynn B., Shacham H., Short signatures from the weil pairings, LNCS, 2248, pp. 514-532, (2001)
[4]  
Cha J., Cheon J., An identity-based signature from Gap Diffie-Hellman groups, Cryptology ePrint Archive: Report, 2002, 18
[5]  
Galbraith S., Harrison K., Soldera D., Implementing the Tate pairing, LNCS, 2369, pp. 324-337, (2002)
[6]  
Hess F., Efficient identity based signature schemes based on pairings, LNCS, 2595, pp. 310-324, (2003)
[7]  
Kim S., Park S., Won D., Proxy signatures, revisited, LNCS, 1334, pp. 223-232, (1997)
[8]  
Lee B., Kim H., Kim K., Strong proxy signature and its applications, Proc. of SCIS 2001, pp. 603-608, (2001)
[9]  
Lee Y., Lee H., An authenticated certificateless public key encryption scheme, Cryptology ePrint Archive: Report, 2004, 150
[10]  
Mambo M., Usuda K., Okamoto E., Proxy signature: Delegation of the power to sign messages, IEICE Trans. Fundamentals, E79-A, 9, pp. 1338-1353, (1996)