Abstract
Certificateless public key cryptography (CL-PKC) is designed to have succinct public key management without using certificates at the same time avoid the key-escrow attribute in the identity-based cryptography. Security mechanisms employing implicit certificates achieve same goals. In this work, we first unify the security notions of these two types of mechanisms with a modified CL-PKC formulation. We further present a general key-pair generation algorithm for CL-PKC schemes and use it to construct certificateless public key signature (CL-PKS) schemes from standard algorithms. The technique, which we apply, helps defeat known-attacks against existing constructions, and the resulting schemes could be quickly deployed based on the existing standard algorithm implementations.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
In [12], a security model of the implicit certificate mechanism is defined. The model is more like for a key agreement and does not consider the Type-II adversary.
References
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29
Al-Riyami, S.S., Paterson, K.G.: CBE from CL-PKE: a generic construction and efficient schemes. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 398–415. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30580-4_27
An, J.H., Dodis, Y., Rabin, T.: On the security of joint signature and encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 83–107. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-46035-7_6
Arazi, B.: Certification of DL/EC Keys. Submission to P1363 meeting (1998). http://grouper.ieee.org/groups/1363/StudyGroup/contributions/arazi.doc
Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134–148. Springer, Heidelberg (2005). https://doi.org/10.1007/11556992_10
Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. J. Cryptol. 22, 1–61 (2009)
Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. J. Cryptol. 21, 178–199 (2008)
Bernstein, D.J.: Multi-User Schnorr Security, Revisited. Cryptology ePrint Archive, Report 2015/996 (2015)
Brown, D.: Generic groups, collision resistance, and ECDSA. Des. Codes Cryptogr. 35, 119–152 (2005)
Brown, D.: On the provable security of ECDSA. In: Advances in Elliptic Curve Cryptography, pp. 21–40. Cambridge University Press (2005)
Brown, D., Campagna, M., Vanstone, S.: Security of ECQV-certified ECDSA against passive adversaries. Cryptology ePrint Archive, Report 2009/620 (2009)
Brown, D.R.L., Gallant, R., Vanstone, S.A.: Provably secure implicit certificate schemes. In: Syverson, P. (ed.) FC 2001. LNCS, vol. 2339, pp. 156–165. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-46088-8_15
Certicom Research. SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV). Version 1.0. (2013)
Cheng, Z., Chen, L.: Certificateless Public Key Signature Schemes from Standard Algorithms (Expanded Version). Cryptology ePrint Archive, Report 2018/386 (2018)
Cheng, Z., Chen, L., Ling, L., Comley, R.: General and efficient certificateless public key encryption constructions. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 83–107. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73489-5_6
Choi, K.Y., Park, J.H., Hwang, J.Y., Lee, D.H.: Efficient certificateless signature schemes. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 443–458. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72738-5_29
Fersch, M., Kiltz, E., Poettering, B.: On the one-per-message unforgeability of (EC) DSA and its variants. In: Kalai, Y., Reyzin, L. (eds.) TCC 2017. LNCS, vol. 10678, pp. 519–534. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70503-3_17
GB/T 32918.2-2017. Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves-Part 2: Digital Signature Algorithm (2017)
Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-39200-9_17
Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490–497. Springer, Heidelberg (1991). https://doi.org/10.1007/3-540-46416-6_42
Groves, M.: Elliptic Curve-Based Certificateless Signatures for Identity-Based Encryption (ECCSI). RFC 6507 (2012)
Harn, L., Ren, J., Lin, C.: Design of DL-based certificateless digital signatures. J. Syst. Softw. 82(5), 789–793 (2009)
He, D., Chen, Y., Chen, J.: A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Math. Comput. Model. 54(11–12), 3143–3152 (2011)
He, D., Chen, J., Zhang, R.: An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int. J. Commun. Syst. 25(11), 1432–1442 (2012)
Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signature revisited. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 308–322. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73458-1_23
Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the security of certificateless signature schemes from Asiacrypt 2003. Proc. CANS 2005, 13–25 (2005)
Jia, X., He, D., Liu, Q., Choo, K.-K.R.: An efficient provably-secure certificateless signature scheme for internet-of-things deployment. Ad Hoc Netw. (to appear)
ISO/IEC. Information Technology - Secruity Techniques - Digital Signatures with Appendix - Part 3: Discrete Logarithm Based Mechanisms. ISO/IEC 14888–3:2016 (2016)
ISO/IEC. Information Technology - Security Techniques - Encryption Algorithms - Part 2: Asymmetric Ciphers. ISO/IEC 18033–2:2006 (2006)
Lai, J., Kou, W.: Self-generated-certificate public key encryption without pairing. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 476–489. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-71677-8_31
Lippold, G., Boyd, C., Nieto, J.G.: Strongly secure certificateless key agreement. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 206–230. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03298-1_14
Liu, W., Xie, Q., Wang, S., Han, L., Hu, B.: Pairing-free certificateless signature with security proof. J. Comput. Netw. Commun. 2014, 6 p. (2014). https://doi.org/10.1155/2014/792063. Article no. 792063
Malone-Lee, J., Smart, N.P.: Modifications of ECDSA. In: Nyberg, K., Heys, H. (eds.) SAC 2002. LNCS, vol. 2595, pp. 1–12. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36492-7_1
Menezes, A., Smart, N.P.: Security of signature schemes in a multi-user setting. Des. Codes Cryptogr. 33, 261–274 (2004)
Pintsov, L.A., Vanstone, S.A.: Postal revenue collection in the digital age. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 105–120. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45472-1_8
Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256–266. Springer, Heidelberg (1997). https://doi.org/10.1007/3-540-69053-0_18
Shafagh, H.: Leveraging public-key-based authentication for the Internet of Things. Master thesis. https://www.inf.ethz.ch/personal/mshafagh/master_thesis_Hossein_Shafagh_PKC_in_the_IoT.pdf
STMicroelectronics. UM1924: STM32 Crypto Library. http://www.st.com/resource/en/user_manual/dm00215061.pdf
Sun, Y., Zhang, F., Baek, J.: Strongly secure certificateless public key encryption without pairing. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 194–208. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-76969-9_13
Tian, M., Huang, L.: Cryptanalysis of a certificateless signature scheme without pairings. Int. J. Commun. Syst. 26(11), 1375–1381 (2013)
Whyte, W., Weimerskircht, A., Kumar, V., Hehn, T.: A security credential management system for V2V communications. In: Proceedings of 2013 IEEE Vehicular Networking Conference, pp. 1–8 (2013)
Yeh, K.-H., Su, C.H., Choo, K.-K.R., Chiu, W.: A novel certificateless signature scheme for smart objects in the Internet-of-Things deployment. Sensors 2017, 17 (1001)
Zhang, Z., Wong, D.S., Xu, J., Feng, D.: Certificateless public-key signature: security model and efficient construction. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 293–308. Springer, Heidelberg (2006). https://doi.org/10.1007/11767480_20
Zhang, L., Zhang, F., Zhang, F.: New efficient certificateless signature scheme. In: Denko, M.K., Shih, C., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.H. (eds.) EUC 2007. LNCS, vol. 4809, pp. 692–703. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77090-9_64
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Cheng, Z., Chen, L. (2018). Certificateless Public Key Signature Schemes from Standard Algorithms. In: Su, C., Kikuchi, H. (eds) Information Security Practice and Experience. ISPEC 2018. Lecture Notes in Computer Science(), vol 11125. Springer, Cham. https://doi.org/10.1007/978-3-319-99807-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-99807-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99806-0
Online ISBN: 978-3-319-99807-7
eBook Packages: Computer ScienceComputer Science (R0)