A Certificate-Based Signature Scheme
In this paper, we propose the security notion of certificate-based signature that uses the same parameters and certificate revocation strategy as the encryption scheme presented at Eurocrypt 2003 by Gentry. Certificate-based signature preserves advantages of certificate-based encryption, such as implicit certification and no private key escrow. We present concrete certificate-based signature schemes derived from pairings on elliptic curves and prove their security in the random oracle model assuming that the underlying group is GDH. Additionally, we propose a concrete delegation-by-certificate proxy signature scheme which is derived from a certificate-based signature scheme after simple modifications. Our proxy scheme is provably secure in the random oracle model under the security notion defined by Boldyreva, Palacio and Warinschi.
KeywordsSignature Scheme Proxy Signature Random Oracle Model Proxy Signature Scheme Security Notion
Unable to display preview. Download preview PDF.
- 1.Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. Cryptology ePrint Archive, Report 2003/12, An extended abstract will appear in Laih, C.-S. (ed.): ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)Google Scholar
- 2.Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586–615 (2003), A preliminary version appeared in Kilian, J. (ed.): CRYPTO 2001. LNCS, vol. 2139. Springer, Heidelberg (2001)Google Scholar
- 6.Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. Cryptology ePrint Archive, Report 2003/096Google Scholar
- 9.Chen, X., Zhang, F., Kim, K.: A new ID-based group signature scheme from bilinear pairings. Cryptology ePrint Archive, Report 2003/116Google Scholar
- 14.Kang, B.G., Park, J.H., Hahn, S.G.: A certificate-based signature scheme, Full version of this paper, Available at http://crypt.kaist.ac.kr/
- 19.Zhang, F., Safavi-Naini, R., Lin, C.-Y.: New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings. Cryptology ePrint Archive, Report 2003/104Google Scholar