Certificateless signature revisited

  • Authors:
  • Xinyi Huang;Yi Mu;Willy Susilo;Duncan S. Wong;Wei Wu

  • Affiliations:
  • Centre for Computer and Information Security Research, School of Computer Science & Software Engineering, University of Wollongong, Australia;Centre for Computer and Information Security Research, School of Computer Science & Software Engineering, University of Wollongong, Australia;Centre for Computer and Information Security Research, School of Computer Science & Software Engineering, University of Wollongong, Australia;Dept. of Computer Science, City University of Hong Kong, Hong Kong, China;Centre for Computer and Information Security Research, School of Computer Science & Software Engineering, University of Wollongong, Australia

  • Venue:
  • ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we revisit the security models of certificateless signatures and propose two new constructions which are provably secure in the random oracle model. We divide the potential adversaries according to their attack power, and for the first time, three new kinds of adversaries are introduced into certificateless signatures. They are Normal Adversary, Strong Adversary and Super Adversary (ordered by their attack power). Combined with the known Type I Adversary and Type II Adversary in certificateless system, we then define the security of certificateless signatures in different attack scenarios. Our new models, together with the others in the literature, will enable us to better understand the security of certificateless signatures. Two concrete schemes with different security levels are also proposed in this paper. The first scheme, which is proved secure against Normal Type I and Super Type II Adversary, enjoys the shortest signature length among all the known certificateless signature schemes. The second scheme is secure against Super Type I and Type II adversary. Compared with the scheme in ACNS 2006 which has a similar security level, our second scheme requires lower operation cost but a little longer signature length.