Certificateless public-key signature : Security model and efficient construction
Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
Author(s)
Related Research Unit(s)
Detail(s)
Original language | English |
---|---|
Title of host publication | Applied Cryptography and Network Security |
Subtitle of host publication | 4th International Conference, ACNS 2006, Proceedings |
Publisher | Springer Verlag |
Pages | 293-308 |
Volume | 3989 LNCS |
ISBN (Print) | 3540347038, 9783540347033 |
Publication status | Published - 2006 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 3989 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Title | 4th International Conference on Applied Cryptography and Network Security, ACNS 2006 |
---|---|
Place | Singapore |
City | Singapore |
Period | 6 - 9 June 2006 |
Link(s)
Abstract
Certificateless public-key cryptosystem is a new and attractive paradigm, which avoids the inherent key escrow property in identity-based public-key cryptosysterns, and does not need expensive certificates as in the public key infrastructure. A strong security model for certificateless public key encryption was established by Al-Riyami and Paterson in 2003. In this paper, we first present a security model for certificateless public-key signature schemes, and then propose an efficient construction based on bilinear pairings. The security of the proposed scheme can be proved to be equivalent to the computational Diffie-Hellman problem in the random oracle model with a tight reduction. © Springer-Verlag Berlin Heidelberg 2006.
Citation Format(s)
Certificateless public-key signature: Security model and efficient construction. / Zhang, Zhenfeng; Wong, Duncan S.; Xu, Jing et al.
Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Proceedings. Vol. 3989 LNCS Springer Verlag, 2006. p. 293-308 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3989 LNCS).
Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Proceedings. Vol. 3989 LNCS Springer Verlag, 2006. p. 293-308 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3989 LNCS).
Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review