ECDLP-based certificateless proxy signature scheme with message recovery

Certificateless public key cryptography (PKC) eliminates the use of certificates in traditional PKC and the key escrow problem in identity‐based PKC. Up to now, a number of certificateless proxy signature (CLPS) schemes have been proposed. However, only a little attention has been paid to the constr...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Transactions on emerging telecommunications technologies 2015-03, Vol.26 (3), p.346-354
Hauptverfasser: Padhye, Sahadeo, Tiwari, Namita
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Certificateless public key cryptography (PKC) eliminates the use of certificates in traditional PKC and the key escrow problem in identity‐based PKC. Up to now, a number of certificateless proxy signature (CLPS) schemes have been proposed. However, only a little attention has been paid to the construction of CLPS schemes with message recovery. Recently, Singh and Verma proposed a CLPS scheme with message recovery from bilinear pairings. Total computation cost of a pairing is higher than that of elliptic curve‐based scalar multiplication over elliptic curve group. So, schemes without pairings would be more appealing in terms of efficiency. To the best of our knowledge, there is no provable secure CLPS scheme with message recovery based on elliptic curve discrete log problem. We first propose such CLPS scheme. Our scheme is secure against existential forgery under adaptive chosen message and ID attacks. Furthermore, it is more efficient than Singh and Verma's scheme for practical applications. Copyright © 2012 John Wiley & Sons, Ltd. Recently, Singh and Verma proposed a certificateless proxy signature (CLPS) scheme with message recovery from bilinear pairings. To the best of our knowledge, there is no provable secure CLPS scheme with message recovery based on elliptic curve discrete log problem. We first propose such a provable secure CLPS scheme after formalizing a security model. Our scheme is secure against existential forgery under adaptive chosen message and ID attacks. Furthermore, it is more efficient than Singh and Verma's scheme for practical applications.
ISSN:2161-3915
2161-3915
DOI:10.1002/ett.2608