Efficient and Short Certificateless Signature

Author(s):  
Raylin Tso ◽  
Xun Yi ◽  
Xinyi Huang
Symmetry ◽  
2017 ◽  
Vol 9 (10) ◽  
pp. 242 ◽  
Author(s):  
Ying-Hao Hung ◽  
Yuh-Min Tseng ◽  
Sen-Shan Huang

2014 ◽  
Vol 9 (8) ◽  
Author(s):  
Yinxia Sun ◽  
Futai Zhang ◽  
Limin Shen

2013 ◽  
Vol 380-384 ◽  
pp. 2435-2438 ◽  
Author(s):  
Shu Rong Feng ◽  
Jiao Mo ◽  
Hua Zhang ◽  
Zheng Ping Jin

Certificateless short signature schemes can not only have the advantage of certificateless signature, but also provide a short signature size in communication. However, all existing certificateless short signature schemes only proven secure against a normal adversary which can only obtain the valid signature for the original public key rather than a super adversary which can obtain the valid signature for the replaced public key. Recently, Fan et al. proposed a certificateless short signature scheme which is very efficient, but we found it is still cannot against super adversary. In this paper, we first analysis their scheme, and then present an improved scheme which can against super adversaries. Furthermore, our scheme can provide both the strongest security level and the shortest signature size compared the existed provably secure certificateless short signature scheme.


Sensors ◽  
2019 ◽  
Vol 19 (12) ◽  
pp. 2692 ◽  
Author(s):  
Xiaodong Yang ◽  
Xizhen Pei ◽  
Guilan Chen ◽  
Ting Li ◽  
Meiding Wang ◽  
...  

With the widespread application of the Internet of Things (IoT), ensuring communication security for IoT devices is of considerable importance. Since IoT data are vulnerable to eavesdropping, tampering, forgery, and other attacks during an open network transmission, the integrity and authenticity of data are fundamental security requirements in the IoT. A certificateless signature (CLS) is a viable solution for providing data integrity, data authenticity, and identity identification in resource-constrained IoT devices. Therefore, designing a secure and efficient CLS scheme for IoT environments has become one of the main objectives of IoT security research. However, the existing CLS schemes rarely focus on strong unforgeability and replay attacks. Herein, we design a novel CLS scheme to protect the integrity and authenticity of IoT data. In addition to satisfying the strong unforgeability requirement, the proposed scheme also resists public key replacement attacks, malicious-but-passive key-generation-centre attacks, and replay attacks. Compared with other related CLS schemes without random oracles, our CLS scheme has a shorter private key, stronger security, and lower communication and computational costs.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 144433-144443 ◽  
Author(s):  
Fatemeh Rezaeibagha ◽  
Yi Mu ◽  
Xinyi Huang ◽  
Wenjie Yang ◽  
Ke Huang

2019 ◽  
Vol 15 (9) ◽  
pp. 5099-5108 ◽  
Author(s):  
Yinghui Zhang ◽  
Robert H. Deng ◽  
Dong Zheng ◽  
Jin Li ◽  
Pengfei Wu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document