ECDLP-based certificateless proxy signature scheme with message recovery
Certificateless public key cryptography (PKC) eliminates the use of certificates in traditional PKC and the key escrow problem in identity‐based PKC. Up to now, a number of certificateless proxy signature (CLPS) schemes have been proposed. However, only a little attention has been paid to the constr...
Gespeichert in:
Veröffentlicht in: | Transactions on emerging telecommunications technologies 2015-03, Vol.26 (3), p.346-354 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Certificateless public key cryptography (PKC) eliminates the use of certificates in traditional PKC and the key escrow problem in identity‐based PKC. Up to now, a number of certificateless proxy signature (CLPS) schemes have been proposed. However, only a little attention has been paid to the construction of CLPS schemes with message recovery. Recently, Singh and Verma proposed a CLPS scheme with message recovery from bilinear pairings. Total computation cost of a pairing is higher than that of elliptic curve‐based scalar multiplication over elliptic curve group. So, schemes without pairings would be more appealing in terms of efficiency. To the best of our knowledge, there is no provable secure CLPS scheme with message recovery based on elliptic curve discrete log problem. We first propose such CLPS scheme. Our scheme is secure against existential forgery under adaptive chosen message and ID attacks. Furthermore, it is more efficient than Singh and Verma's scheme for practical applications. Copyright © 2012 John Wiley & Sons, Ltd.
Recently, Singh and Verma proposed a certificateless proxy signature (CLPS) scheme with message recovery from bilinear pairings. To the best of our knowledge, there is no provable secure CLPS scheme with message recovery based on elliptic curve discrete log problem. We first propose such a provable secure CLPS scheme after formalizing a security model. Our scheme is secure against existential forgery under adaptive chosen message and ID attacks. Furthermore, it is more efficient than Singh and Verma's scheme for practical applications. |
---|---|
ISSN: | 2161-3915 2161-3915 |
DOI: | 10.1002/ett.2608 |