Abstract
During these years, the research field of certificateless signature (CLS) scheme is promptly investigated as the key escrow problem in identity-based cryptography can be solved via CLS concept. However, due to the bandwidth limitation of mobile communication and the resource-constraint property of handheld mobile devices, most CLS schemes cannot fulfill the requirement of computation efficiency for mobile communication architecture. Hence, the design of lightweight CLS protocol refined from traditional cryptosystem technologies for existing mobile communication environment becomes one of the most important research trends. In this paper, we demonstrate a novel CLS scheme which is immune against bilinear pairings. Without the heavy computation of bilinear pairings, our proposed scheme is efficient and practical for mobile communication. Meanwhile, the proposed CLS scheme possesses strong security density owing to the adoption of point addition of elliptic curve cryptography. A formal security analysis is presented to guarantee the security robustness of our CLS protocol under the hardness of breaking elliptic curve discrete logarithm problem.
Similar content being viewed by others
References
Al-Riyami, Paterson K (2003) Certificateless public key cryptography. In Proceedings of ASIACRYPT 2003, Lecture Notes in Computer Science, vol. 2894, pp 452–473
Gong, Li P (2012) Further improvement of a certificateless signature scheme without pairing. Int J Commun Syst. doi:10.1002/dac.2457
Gorantla M, Saxena A (2005) An efficient certificateless signature scheme. In Proceedings of 2005 International Conference on Computational Intelligence and Security, pp 110–116
He D, Chen J, Hu J (2012) A pairing-free certificateless authenticated key agreement protocol. Int J Commun Syst 25:221–230
He D, Chen J, Zhang R (2012) An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int J Commun Syst 25(11):1432–1442
Hu BC, Wong DS, Zhang Z, Deng X (2006) Key replacement attack against a generic construction of certificateless signature. In Proceedings of ACISP 2006, Lecture Notes in Computer Science, vol. 4058, pp 235–246
Huang X, Mu Y, Susilo W, Wong DS, Wu W (2007) Certificateless signature revisited. In Proceedings of ACISP 2007, Lecture Notes in Computer Science, vol. 4586, pp 308–322
Huang WS, Mu Y, Zhang F (2005) On the security of certificateless signature schemes from asiacrypt 2003. In Proceedings of CANS 2005, Lecture Notes in Computer Science, vol. 3810, pp 13–25
Java Elliptic Curve Cryptography project, http://jecc.sourceforge.net/
Li X, Chen K, Sun L (2005) Certificateless signature and proxy signature schemes from bilinear pairings. Lith Math J 45:76–83
Shamir (1985) Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO’84, Lecture Notes in Computer Science, vol. 196, pp 47–53
Tian M, Huang L (2012) Cryptanalysis of a certificateless signature scheme without pairings. Int J Commun Syst. doi:10.1002/dac.2310
Tsai J-L, Lo N-W, Wu T-C (2012) Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. Int J Commun Syst. doi:10.1002/dac.2388
Yeh K-H, Tsai K-Y, Kuo R-Z, Wu T-C (2013) Robust certificateless signature scheme without bilinear pairings. In Proceeding of the 2013 International Conference IT Convergence and Security (ICITCS 2013), pp 1–4, 16–18
Yum D, Lee P (2004) Generic construction of certificateless signature. In Proceeding of the 9th Australasian Conference on Information Security and Privacy, pp 200–211
Acknowledgments
This work was partly supported by the Taiwan Information Security Center (TWISC) and National Science Council, Taiwan, under the Grants Numbers NSC 102-2218-E-259-004, NSC 102-2218-E-146-002 and NSC 102-2218-E-011-012.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yeh, KH., Tsai, KY. & Fan, CY. An efficient certificateless signature scheme without bilinear pairings. Multimed Tools Appl 74, 6519–6530 (2015). https://doi.org/10.1007/s11042-014-2154-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2154-4