TY - GEN
T1 - Certificateless signature revisited
AU - Huang, Xinyi
AU - Mu, Yi
AU - Susilo, Willy
AU - Wong, Duncan S.
AU - Wu, Wei
PY - 2007
Y1 - 2007
N2 - In this paper we revisit the security models of certificateless signatures and propose two new constructions which are provably secure in the random oracle model. We divide the potential adversaries according to their attack power, and for the first time, three new kinds of adversaries are introduced into certificateless signatures. They are Normal Adversary, Strong Adversary and Super Adversary (ordered by their attack power). Combined with the known Type I Adversary and Type II Adversary in certificateless system, we then define the security of certificateless signatures in different attack scenarios. Our new models, together with the others in the literature, will enable us to better understand the security of certificateless signatures. Two concrete schemes with different security levels are also proposed in this paper. The first scheme, which is proved secure against Normal Type I and Super Type II Adversary, enjoys the shortest signature length among all the known certificateless signature schemes. The second scheme is secure against Super Type I and Type II adversary. Compared with the scheme in ACNS 2006 which has a similar security level, our second scheme requires lower operation cost but a little longer signature length. © Springer-Verlag Berlin Heidelberg 2007.
AB - In this paper we revisit the security models of certificateless signatures and propose two new constructions which are provably secure in the random oracle model. We divide the potential adversaries according to their attack power, and for the first time, three new kinds of adversaries are introduced into certificateless signatures. They are Normal Adversary, Strong Adversary and Super Adversary (ordered by their attack power). Combined with the known Type I Adversary and Type II Adversary in certificateless system, we then define the security of certificateless signatures in different attack scenarios. Our new models, together with the others in the literature, will enable us to better understand the security of certificateless signatures. Two concrete schemes with different security levels are also proposed in this paper. The first scheme, which is proved secure against Normal Type I and Super Type II Adversary, enjoys the shortest signature length among all the known certificateless signature schemes. The second scheme is secure against Super Type I and Type II adversary. Compared with the scheme in ACNS 2006 which has a similar security level, our second scheme requires lower operation cost but a little longer signature length. © Springer-Verlag Berlin Heidelberg 2007.
KW - Certificateless cryptology
KW - Random oracle
KW - Security model
KW - Signature
UR - http://www.scopus.com/inward/record.url?scp=38149080541&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-38149080541&origin=recordpage
U2 - 10.1007/978-3-540-73458-1_23
DO - 10.1007/978-3-540-73458-1_23
M3 - RGC 32 - Refereed conference paper (with host publication)
SN - 9783540734574
T3 - Lecture Notes in Computer Science
SP - 308
EP - 322
BT - Information Security and Privacy
A2 - Pieprzyk, Josef
A2 - Ghodosi, Hossein
A2 - Dawson, Ed
PB - Springer
CY - Berlin, Heidelberg
T2 - 12th Australasian Conference on Information Security and Privacy (ACISP2007)
Y2 - 2 July 2007 through 4 July 2007
ER -