Skip to main content
Log in

An efficient certificateless signature scheme without bilinear pairings

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

During these years, the research field of certificateless signature (CLS) scheme is promptly investigated as the key escrow problem in identity-based cryptography can be solved via CLS concept. However, due to the bandwidth limitation of mobile communication and the resource-constraint property of handheld mobile devices, most CLS schemes cannot fulfill the requirement of computation efficiency for mobile communication architecture. Hence, the design of lightweight CLS protocol refined from traditional cryptosystem technologies for existing mobile communication environment becomes one of the most important research trends. In this paper, we demonstrate a novel CLS scheme which is immune against bilinear pairings. Without the heavy computation of bilinear pairings, our proposed scheme is efficient and practical for mobile communication. Meanwhile, the proposed CLS scheme possesses strong security density owing to the adoption of point addition of elliptic curve cryptography. A formal security analysis is presented to guarantee the security robustness of our CLS protocol under the hardness of breaking elliptic curve discrete logarithm problem.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Al-Riyami, Paterson K (2003) Certificateless public key cryptography. In Proceedings of ASIACRYPT 2003, Lecture Notes in Computer Science, vol. 2894, pp 452–473

  2. Gong, Li P (2012) Further improvement of a certificateless signature scheme without pairing. Int J Commun Syst. doi:10.1002/dac.2457

    Google Scholar 

  3. Gorantla M, Saxena A (2005) An efficient certificateless signature scheme. In Proceedings of 2005 International Conference on Computational Intelligence and Security, pp 110–116

  4. He D, Chen J, Hu J (2012) A pairing-free certificateless authenticated key agreement protocol. Int J Commun Syst 25:221–230

    Article  Google Scholar 

  5. He D, Chen J, Zhang R (2012) An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int J Commun Syst 25(11):1432–1442

    Article  Google Scholar 

  6. Hu BC, Wong DS, Zhang Z, Deng X (2006) Key replacement attack against a generic construction of certificateless signature. In Proceedings of ACISP 2006, Lecture Notes in Computer Science, vol. 4058, pp 235–246

  7. Huang X, Mu Y, Susilo W, Wong DS, Wu W (2007) Certificateless signature revisited. In Proceedings of ACISP 2007, Lecture Notes in Computer Science, vol. 4586, pp 308–322

  8. Huang WS, Mu Y, Zhang F (2005) On the security of certificateless signature schemes from asiacrypt 2003. In Proceedings of CANS 2005, Lecture Notes in Computer Science, vol. 3810, pp 13–25

  9. Java Elliptic Curve Cryptography project, http://jecc.sourceforge.net/

  10. Li X, Chen K, Sun L (2005) Certificateless signature and proxy signature schemes from bilinear pairings. Lith Math J 45:76–83

    Article  MATH  MathSciNet  Google Scholar 

  11. Shamir (1985) Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO’84, Lecture Notes in Computer Science, vol. 196, pp 47–53

  12. Tian M, Huang L (2012) Cryptanalysis of a certificateless signature scheme without pairings. Int J Commun Syst. doi:10.1002/dac.2310

    Google Scholar 

  13. Tsai J-L, Lo N-W, Wu T-C (2012) Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. Int J Commun Syst. doi:10.1002/dac.2388

    Google Scholar 

  14. Yeh K-H, Tsai K-Y, Kuo R-Z, Wu T-C (2013) Robust certificateless signature scheme without bilinear pairings. In Proceeding of the 2013 International Conference IT Convergence and Security (ICITCS 2013), pp 1–4, 16–18

  15. Yum D, Lee P (2004) Generic construction of certificateless signature. In Proceeding of the 9th Australasian Conference on Information Security and Privacy, pp 200–211

Download references

Acknowledgments

This work was partly supported by the Taiwan Information Security Center (TWISC) and National Science Council, Taiwan, under the Grants Numbers NSC 102-2218-E-259-004, NSC 102-2218-E-146-002 and NSC 102-2218-E-011-012.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kuo-Yu Tsai.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yeh, KH., Tsai, KY. & Fan, CY. An efficient certificateless signature scheme without bilinear pairings. Multimed Tools Appl 74, 6519–6530 (2015). https://doi.org/10.1007/s11042-014-2154-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2154-4

Keywords

Navigation