Lithuanian Mathematical Journal

, Volume 45, Issue 1, pp 76–83 | Cite as

Certificateless signature and proxy signature schemes from bilinear pairings

  • X. Li
  • K. Chen
  • L. Sun


Due to avoiding the inherent escrow of identity-based cryptography and yet not requiring certificates to guarantee the authenticity of public keys, certificateless public key cryptography has received a significant attention. Due to various applications of bilinear pairings in cryptography, numerous pairing-based encryption schemes, signature schemes, and other cryptographic primitives have been proposed. In this paper, a new certificateless signature scheme based on bilinear pairings is presented. The signing algorithm of the proposed scheme is very simple and does not require any pairing computation. Combining our signature scheme with certificateless public key cryptography yields a complete solution of certificateless public key system. As an application of the proposed signature scheme, a certificateless proxy signature scheme is also presented. We analyze both schemes from security point of view.


certificateless public key cryptography certificateless signature proxy signature bilinear pairs 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    S. Al-Riyami and K. Paterson, Certificateless public key cryptography, in: Proc. Asiacrypt 2003, LNCS 2894 (2003), pp. 452–473.Google Scholar
  2. 2.
    P. Barreto, H. Kim, B. Lynn, and M. Scott, Efficient algorithms for pairing-based cryptosystems, in: Proc. CRYPTO 2002, LNCS 2442 (2002), pp. 354–368.Google Scholar
  3. 3.
    D. Boneh, B. Lynn, and H. Shacham, Short signatures from the weil pairings, in: Proc. Asiacrypt 2001, LNCS 2248 (2001), pp. 514–532.Google Scholar
  4. 4.
    J. Cha and J. Cheon, An identity-based signature from Gap Diffie-Hellman groups. Cryptology ePrint Archive: Report 2002/018. Scholar
  5. 5.
    S. Galbraith, K. Harrison, and D. Soldera, Implementing the Tate pairing, in: Proc. of Algorithmic Number Theory 5th International Symposium, ANTS-V, LNCS 2369 (2002), pp. 324–337.Google Scholar
  6. 6.
    F. Hess, Efficient identity based signature schemes based on pairings, in: Proc. of 9th Workshop on Selected Areas in Cryptography, SAC2002, LNCS 2595, Springer (2003), pp. 310–324.Google Scholar
  7. 7.
    S. Kim, S. Park, and D. Won, Proxy signatures, revisited, in: Proc. ICICS97, International Conference on Information and Communications Security, LNCS 1334 (1997), pp. 223–232.Google Scholar
  8. 8.
    B. Lee, H. Kim, and K. Kim, Strong proxy signature and its applications, in: Proc. of SCIS 2001 (2001), pp. 603–608.Google Scholar
  9. 9.
    Y. Lee and H. Lee, An authenticated certificateless public key encryption scheme, Cryptology ePrint Archive: Report 2004/150. Available at: Scholar
  10. 10.
    M. Mambo, K. Usuda, and E. Okamoto, Proxy signature: delegation of the power to sign messages, IEICE Trans. Fundamentals, E79-A:9, 1338–1353 (1996).Google Scholar
  11. 11.
    M. Mambo, K. Usuda, and E. Okamoto, Proxy signature for delegating signing opertion, in: Proc. of 3rd ACM Conference on Computer and Communications Security, ACM Press, New York (1996), pp. 48–57.Google Scholar
  12. 12.
    T. Okamoto and D. Pointcheval, The gap-problems: a new class of problems for the security of cryptographic schemes, in: Proc. of PKC 2001, LNCS 1992 (2001), pp. 104–118.Google Scholar
  13. 13.
    K. Paterson, ID-based signatures from pairings on elliptic curves, Electronics Letters, 38487, 1025–1020, January (1999).Google Scholar
  14. 14.
    A. Shamir, Identity-based cryptosystems and signature schemes, in: Advances in Cryptology — CRYPTO’84 LNCS 196, Springer (1984), pp. 47–53.Google Scholar
  15. 15.
    D. Yum and P. Lee, Generic construction of certificateless signature, in: Proc. ACISP 2004, LNCS 3108 (2004), pp. 200–211.Google Scholar
  16. 16.
    F. Zhang, R. Safavi-Naini, and C. Lin, New proxy signature, proxy blind signature, proxy ring signature schemes from bilinear pairings, Cryptology ePrint Archive: Report 2003/104: Scholar

Copyright information

© Springer Science+Business Media, Inc. 2005

Authors and Affiliations

  • X. Li
    • 1
  • K. Chen
    • 1
  • L. Sun
    • 2
  1. 1.Shanghai Jiaotong UniversityShanghaiChina
  2. 2.Nanjing UniversityNanjingChina

Personalised recommendations