Secure Certificateless Signature Scheme with Batch Verification from Bilinear Pairings
In view of simplifying certificate management complexities in the traditional Public Key Cryptography (PKC) and to abolish the key escrow problem in identity based PKC (ID-PKC), concept of Certificateless Public Key Cryptography (CL-PKC) was introduced. Batch Cryptography emphasizes new developments in information security and communication networks. It has been developed to enhance the efficiency of signatures verification, by verifying a batch of n message, signature pairs in a single instance. Batch Verification (BV) can be used in various areas where many clients interact with a single server. Mail servers, Sensor Networks, e-commerce are the best examples for BV. In this paper, we present a certificateless signature (CLS) scheme that supports BV using pairings. The proof of security is presented in Random Oracle Model (ROM) under the assumption of Computational Diffie-Hellman (CDH) Problem is intractable. More over the security proofs are made without using forking lemma  to achieve tight security. The efficiency analysis shows that our CLS scheme is more secure and efficient than the existing schemes.
KeywordsPublic key cryptography CLS scheme Batch verification Bilinear pairing ROM CDH problem
The authors are grateful and sincerely thank the reviewers for their valuable suggestions. This work is supported by WOS-A, DST, Govt. of India under the grant No.SR/WOS-A/PM-1033/2014 (G), WOS-A, DST.
- 5.Fan, C.I., Ho, P.H., Tseng, Y. F.: Strongly secure certificateless signature scheme supporting batch verification In: Mathematical Problems in Engineering, vol. 2014, Article ID 854135, 11 pages. Hindawi Publishing Corporation. http://dx.doi.org/10.1155/2014/854135. (2014)
- 6.Fiat, A.: “Batch RSA,” in Advances in cryptology-CRYPTO, pp. 175–185. (1990)Google Scholar
- 7.Geng, M., Zhang, F.: Batch verification for certificateless signature schemes. In: Proceedings of the International Conference on Computational Intelligence and Security (CIS 2009), pp. 288– 292, December. 2009Google Scholar
- 8.MIRACL Library. http://certivox.org/display/EXT/MIRACL