On the security models for certificateless signature schemes achieving level 3 security

نویسندگان

  • Yu-Chi Chen
  • Gwoboa Horng
چکیده

Public key cryptography has found many applications in our modern society. To guarantee the authenticity of public keys, we need a trusted third party (TTP). In 1991, Girault defined three trust levels for a TTP. The higher the trusted level of the TTP is, the higher the security level of the cryptographic scheme is. In 2007, Hu et al. proposed a generic construction of a certificateless signature scheme, together with a security model, achieving Girault’s level 3 security. In 2011, Fan et al. presented a certificateless short signature scheme based on pairings. In this paper, we consider in depth the security requirements of certificateless signature schemes and show that previous models are inappropriate for achieving the desired level of security. We also present a new security model for a certificateless signature scheme to achieve level 3 security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Certificateless Signature Revisited

In this paper we revisit the security models of certificateless signatures and propose two new constructions which are provably secure in the random oracle model. We divide the potential adversaries according to their attack power, and for the first time, three new kinds of adversaries are introduced into certificateless signatures. They are Normal Adversary, Strong Adversary and Super Adversar...

متن کامل

Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes

Certificateless signatures (CLSs) were introduced to solve the key escrow problem of identity-based signatures. In CLS, the full private key is determined by neither the user nor the trusted third party. However, a certificate of a public key is not required in CLS schemes; therefore, anyone can replace the public key. On the formal security, there are two types of adversaries where the Type I ...

متن کامل

Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings

Certificateless signature scheme is a practical solution to confront the drawback, Key Generation Center (KGC) being able to forge the signature of a user, of an identity based (ID-based) signature scheme. Lots of previous research results have shown the security models and the generic constructions for certificateless signatures. However, most of them did not satisfy Girault’s level-3 security...

متن کامل

Cryptanalysis on Du-Wen Certificateless Short Signature Scheme

Certificateless signature scheme is a practical solution to confront the drawback, KGC being able to forge the signature of a user, of an identity based signature scheme. Lots of previous research results have shown the security models and the generic constructions for certificateless signatures. However, most of them did not satisfy Girault’s level-3 security which the conventional public key ...

متن کامل

A Certificateless Strong Designated Verifier Signature Scheme with Non-delegatability

The designated verifier signature only enables the designated verifier to check the correctness of the signature, while any third party can not verify whether this signature is valid or not. Most of the previous designated verifier signature schemes depend on certificate-based cryptography or identity-based cryptography, while little attention has been paid to the certificateless designated ver...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2011  شماره 

صفحات  -

تاریخ انتشار 2011