Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model

نویسندگان

  • Wei Gao
  • Guilin Wang
  • Kefei Chen
  • Xueli Wang
چکیده

Similar to certificateless cryptography, certificate-based cryptography is another novel public key setting which combines the merits of traditional public key cryptography (PKC) and identity-based cryptography (IBC). Both certificateless cryptography and certificate based cryptography do not have the key escrow problem in identity-based cryptography, and greatly reduce the overhead of certificate management in traditional PKC. Public key encryption and digital signature are two main issues in public key cryptography. In this paper, we deal with the generic construction of certificate based signature from certificateless signature. In 2009, Wu et al. proposed the first generic conversion from certificateless signature (CLS) to certificate based signature (CBS). However, Wu et al.’s method has to involve a cryptographic hash function which is assumed to be a random oracle for security proof. This paper proposes another intuitive, simple and provably secure generic conversion from CLS to CBS. A new security model for CLS is formalized and then it is proved that this generic conversion is secure in the stand model, only if the underlying CLS scheme is secure in our new security model. As Email addresses: [email protected] (Wei Gao), [email protected] (Guilin Wang), [email protected] (Kefei Chen), [email protected] (Xueli Wang ) This work is completed when the first author visited University of Wollongong (20112012) Preprint submitted to **** February 27, 2012 an example, based on this new generic method, we construct a new provably secure certificate based signature scheme.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Convertible limited (multi-) verifier signature: new constructions and applications

A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...

متن کامل

Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model

Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of Identity-Based Cryptography (IBC) while without having the problem of key escrow. However, it does suffer to an attack where the adversary, Carol, replaces Alice’s public key by someone’s public key so that Bob, who wants to send an encrypted message to Alice, uses Alice’s identity and other’s public key as the inpu...

متن کامل

Certificate-based Signatures Revisited

Certificate-based encryption was introduced in Eurocrypt’03 to solve the certificate management problem in public key encryption. Recently, this idea was extended to certificate-based signatures. Several new schemes and security models of certificate-based signatures have been proposed. In this paper, we first take a closer look at the certificate-based signature by comparing it with digital si...

متن کامل

A Provably Secure Ring Signature Scheme in Certificateless Cryptography

Ring signature is a kind of group-oriented signature. It allows amember of a group to sign messages on behalf of the group withoutrevealing his/her identity. Certificateless public key cryptography wasfirst introduced by Al-Riyami and Paterson in Asiacrypt 2003. Incertificateless cryptography, it does not require the use of certificatesto guarantee the authenticity of users’...

متن کامل

A Provably Secure Nyberg-Rueppel Signature Variant with Applications

This paper analyzes the modified Nyberg-Rueppel signature scheme (mNR), proving it secure in the Generic Group Model (GM). We also show that the security of the mNR signature is equivalent (in the standard model) to that of a twin signature [32], while achieving computational and bandwidth improvements. As a provably secure signature scheme, mNR is very efficient. We demonstrate its practical r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012