Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model
نویسندگان
چکیده
Similar to certificateless cryptography, certificate-based cryptography is another novel public key setting which combines the merits of traditional public key cryptography (PKC) and identity-based cryptography (IBC). Both certificateless cryptography and certificate based cryptography do not have the key escrow problem in identity-based cryptography, and greatly reduce the overhead of certificate management in traditional PKC. Public key encryption and digital signature are two main issues in public key cryptography. In this paper, we deal with the generic construction of certificate based signature from certificateless signature. In 2009, Wu et al. proposed the first generic conversion from certificateless signature (CLS) to certificate based signature (CBS). However, Wu et al.’s method has to involve a cryptographic hash function which is assumed to be a random oracle for security proof. This paper proposes another intuitive, simple and provably secure generic conversion from CLS to CBS. A new security model for CLS is formalized and then it is proved that this generic conversion is secure in the stand model, only if the underlying CLS scheme is secure in our new security model. As Email addresses: [email protected] (Wei Gao), [email protected] (Guilin Wang), [email protected] (Kefei Chen), [email protected] (Xueli Wang ) This work is completed when the first author visited University of Wollongong (20112012) Preprint submitted to **** February 27, 2012 an example, based on this new generic method, we construct a new provably secure certificate based signature scheme.
منابع مشابه
Convertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملSelf-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model
Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of Identity-Based Cryptography (IBC) while without having the problem of key escrow. However, it does suffer to an attack where the adversary, Carol, replaces Alice’s public key by someone’s public key so that Bob, who wants to send an encrypted message to Alice, uses Alice’s identity and other’s public key as the inpu...
متن کاملCertificate-based Signatures Revisited
Certificate-based encryption was introduced in Eurocrypt’03 to solve the certificate management problem in public key encryption. Recently, this idea was extended to certificate-based signatures. Several new schemes and security models of certificate-based signatures have been proposed. In this paper, we first take a closer look at the certificate-based signature by comparing it with digital si...
متن کاملA Provably Secure Ring Signature Scheme in Certificateless Cryptography
Ring signature is a kind of group-oriented signature. It allows amember of a group to sign messages on behalf of the group withoutrevealing his/her identity. Certificateless public key cryptography wasfirst introduced by Al-Riyami and Paterson in Asiacrypt 2003. Incertificateless cryptography, it does not require the use of certificatesto guarantee the authenticity of users’...
متن کاملA Provably Secure Nyberg-Rueppel Signature Variant with Applications
This paper analyzes the modified Nyberg-Rueppel signature scheme (mNR), proving it secure in the Generic Group Model (GM). We also show that the security of the mNR signature is equivalent (in the standard model) to that of a twin signature [32], while achieving computational and bandwidth improvements. As a provably secure signature scheme, mNR is very efficient. We demonstrate its practical r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2012 شماره
صفحات -
تاریخ انتشار 2012