Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
PKI: It's Not Dead, Just Resting
Computer
Fast Digital Identity Revocation (Extended Abstract)
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Certificate revocation and certificate update
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A General and Secure Certification-based Encryption Construction
CHINAGRID '08 Proceedings of the The Third ChinaGrid Annual Conference (chinagrid 2008)
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption
ISECS '08 Proceedings of the 2008 International Symposium on Electronic Commerce and Security
Generic Construction of Certificate-Based Encryption
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
Certificate based (linkable) ring signature
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Certificateless signature revisited
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
A certificate-based proxy cryptosystem with revocable proxy decryption power
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
On the security of certificateless signature schemes from asiacrypt 2003
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
CBE from CL-PKE: a generic construction and efficient schemes
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Chosen-ciphertext security of multiple encryption
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Sequential aggregate signatures and multisignatures without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Key replacement attack against a generic construction of certificateless signature
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Certificate-based signature: security model and efficient construction
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
An efficient short certificate-based signature scheme
Journal of Systems and Software
Certificate-based signcryption with enhanced security features
Computers & Mathematics with Applications
A forward-secure certificate-based signature scheme in the standard model
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Provably secure certificate-based signature scheme without pairings
Information Sciences: an International Journal
Hi-index | 0.00 |
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certificate-based encryption lies in the following features: (1) providing more efficient public-key infrastructure (PKI) that requires less infrastructure, (2) solving the certificate revocation problem, and (3) eliminating third-party queries in the traditional PKI. Additionally, it also offers the solution to the inherent key escrow problem in the identity-based cryptography. The contributions of this paper are threefold. Firstly, we introduce a new attack called the “Key Replacement Attack” into the certificate-based signature system and refine the security model of certificate-based signature. Secondly, we show that the certificate-based signature scheme presented by Kang, Park and Hahn in CT-RSA 2004 is insecure against key replacement attacks. Thirdly, we present two new certificate-based signature schemes secure against key replacement attacks. Our first scheme is existentially unforgeable against adaptive chosen message attacks under the computational Diffie-Hellman assumption in the random oracle model. Compared with the certificate-based signature scheme in CT-RSA 2004, our first scheme enjoys shorter signature length and less operation cost. Our second scheme is inspired by Waters signature and is the first construction of certificate-based signature secure against key replacement attacks in the standard model.