×

zbMATH — the first resource for mathematics

Signatures in hierarchical certificateless cryptography: efficient constructions and provable security. (English) Zbl 1341.94024
Summary: Many efforts have been devoted in recent years to constructing secure schemes in certificateless cryptography. The aim is to eliminate the key escrow problem of identity-based cryptography. However, most of the work takes place in traditional certificateless cryptography, which suffers from the single-point problem. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world and hence can eliminate the single-point problem. To incorporate the advantages of both types of cryptosystems, in this paper we instantiate hierarchical certificateless cryptography by formalizing the notion of hierarchical certificateless signatures. A concrete hierarchical certificateless signature scheme is also proposed. The security of our scheme is proven under the computational Diffie-Hellman assumption. As to efficiency, our scheme has constant complexity, regardless of the depth of the hierarchy. Therefore, our proposal is secure and scalable.

MSC:
94A60 Cryptography
94A62 Authentication, digital signatures and secret sharing
PDF BibTeX XML Cite
Full Text: DOI
References:
[1] S. Al-Riyami, K. Paterson, Certificateless public key cryptography, in: ASIACRYPT 2003, LNCS 2894, 2003, pp. 452-473. · Zbl 1205.94072
[2] M. Au, J. Chen, J. Liu, Y. Mu, D. Wong, G. Yang, Malicious KGC attacks in certificateless cryptography, in: ACM ASIACCS, 2007, pp. 302-311.
[3] M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in: ACM CCS 1993, 1993, pp. 62-73.
[4] A. Boldyreva, V. Goyal, V. Kumar, Identity-based encryption with efficient revocation, in: ACM CCS 2008, 2008, pp. 417-426.
[5] D. Boneh, X. Boyen, E. Goh, Hierarchical identity based encryption with constant size ciphertext, in: EUROCRYPT 2005, LNCS 3494, 2005, pp. 440-456. · Zbl 1137.94340
[6] Boneh, D.; Franklin, M., Identity-based encryption from the Weil pairing, SIAM J. Comput., 32, 3, 586-615, (2003) · Zbl 1046.94008
[7] X. Boyen, B. Waters, Anonymous hierarchical identity-based encryption (without random oracles), in: CRYPTO 2006, LNCS 4117, 2006, pp. 290-307. · Zbl 1161.94390
[8] X. Boyen, B. Waters, Compact group signatures without random oracles, in: EUROCRYPT 2006, LNCS 4004, 2006, pp. 427-444. · Zbl 1140.94327
[9] R. Canetti, S. Halevi, J. Katz, A forward-secure public-key encryption scheme, in: EUROCRYPT 2003, LNCS 2656, 2003, pp. 255-271. · Zbl 1037.68532
[10] A. Dent, B. Libert, K. Paterson, Certificateless encryption schemes strongly secure in the standard model, in: PKC 2008, LNCS 4939, 2008, pp. 344-359. · Zbl 1162.94352
[11] M. Girault, Self-certified public keys, in: EUROCRYPT’91, LNCS 547, 1992, pp. 490-497. · Zbl 0825.68374
[12] C. Gentry, A. Silverberg, Hierarchical ID-based cryptography, in: ASIACRYPT 2002, LNCS 2501, 2002, pp. 548-566. · Zbl 1065.94547
[13] R. Granger, N.P. Smart, On computing products of pairings, Cryptology ePrint Archive: Report 2006/172. <http://eprint.iacr.org/2006/172>.
[14] Y. Hanaoka, G. Hanaoka, J. Shikata, H. Imai, Identity-based hierarchical strongly key-insulated encryption and its application, Cryptology ePrint Archive: Report 2004/338. <http://eprint.iacr.org/2004/338>. · Zbl 1154.94393
[15] J. Horwitz, B. Lynn, Towards hierarchical identity-based encryption, in: EUROCRYPT 2002, LNCS 2332, 2002, pp. 466-481. · Zbl 1056.94514
[16] B. Hu, D. Wong, Z. Zhang, X. Deng, Key replacement attack against a generic construction of certificateless signature, in: ACISP 2006, LNCS 4058, 2006, pp. 235-346. · Zbl 1176.94044
[17] X. Huang, Y. Mu, W. Susilo, D. Wong, W. Wu, Certificateless signature revisited, in: ACISP 2007, LNCS 4586, 2007, pp. 308-322. · Zbl 1213.94158
[18] X. Huang, W. Susilo, Y. Mu, F. Zhang, On the security of a certificateless signature scheme, in: CANS 2005, LNCS 3810, 2005, pp. 13-25. · Zbl 1154.94459
[19] Li, J.; Wang, Z.; Zhang, Y., Provably secure certificate-based signature scheme without pairings, Inform. Sci., 233, 313-320, (2013) · Zbl 1284.94141
[20] H. Lim, K. Paterson, Multi-key hierarchical identity-based signatures, in: Cryptography and Coding 2007, LNCS 4887, 2007, pp. 384-402. · Zbl 1154.94467
[21] Miao, S.; Zhang, F.; Li, S.; Mu, Y., On security of a certificateless signcryption scheme, Inform. Sci., 232, 475-481, (2013) · Zbl 1293.94105
[22] Miller, V., The Weil pairing, and its efficient calculation, J. Cryptol., 17, 4, 235-261, (2004) · Zbl 1078.14043
[23] Y. Ren, D. Gu, Secure hierarchical identity based encryption scheme in the standard model, in: INDOCRYPT 2008, LNCS 5365, 2008, pp. 104-115. · Zbl 1203.94121
[24] A. Shamir, Identity based cryptosystems and signature schemes, in: Crypto’84, LNCS 196, 1984, pp. 47-53. · Zbl 1359.94626
[25] D. Yum, P. Lee, Generic construction of certificateless signature, in: ACISP 2004, LNCS 3108, 2004, pp. 200-211. · Zbl 1098.94635
[26] Zhang, J.; Mao, J., An efficient RSA-based certificateless signature scheme, J. Syst. Softw., 85, 3, 638-642, (2012)
[27] Z. Zhang, D. Wong, J. Xu, D. Feng, Certificateless public-key signature: security model and efficient construction, in: ACNS 2006, LNCS 3989, 2006, pp. 293-308. · Zbl 1151.94638
[28] Zhang, L.; Wu, Q.; Domingo-Ferrer, J.; Qin, B., Hierarchical certificateless signatures. TRUSTCOM, 2010, 572-577, (2010)
[29] Zhang, L.; Zhang, F.; Qin, B.; Liu, S., Provably-secure electronic cash based on certificateless partially-blind signatures, Electron. Commerce Res. Appl., 10, 5, 545-552, (2011)
[30] Zhang, L.; Zhang, F.; Wu, Q., Delegation of signing rights using certificateless proxy signatures, Inform. Sci., 184, 1, 298-309, (2012) · Zbl 1239.94080
[31] Zhang, L.; Zhang, F.; Wu, Q.; Domingo-Ferrer, J., Simulatable certificateless two-party authenticated key agreement protocol, Inform. Sci., 180, 6, 1020-1030, (2010) · Zbl 1185.94085
[32] Zhang, L.; Qin, B.; Wu, Q.; Zhang, F., Efficient many-to-one authentication with certificateless aggregate signatures, Comput. Netw., 54, 14, 2482-2491, (2010) · Zbl 1346.68088
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.