Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
PKI: It's Not Dead, Just Resting
Computer
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Malicious KGC attacks in certificateless cryptography
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
RSA-Based Certificateless Public Key Encryption
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Security proofs for signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Collision-free accumulators and fail-stop signature schemes without trees
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Certificateless signature revisited
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Generic certificateless encryption in the standard model
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Security analysis of two signature schemes and their improved schemes
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
On the security of certificateless signature schemes from asiacrypt 2003
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Certificateless public-key signature: security model and efficient construction
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Certificate-free ad hoc anonymous authentication
Information Sciences: an International Journal
Hi-index | 0.00 |
Until now, the only known construction of certificateless signature scheme is mainly based on the rather new and untested assumptions related to bilinear maps. But the implementations of pairings are more time-consuming than exponentiation operator in a RSA group. As an industry standard cryptographic algorithm, RSA is widely applied in real-life scenarios and provides many interfaces for the applied software. However, to the best of our knowledge, there does not exist RSA-based certificateless signature scheme. To overcome this problem, we present a RSA-based construction of certificateless signature scheme in the paper. And the scheme is shown to be secure in the random oracles model. The security of the scheme is closely related to the RSA problem and the discrete logarithm problem.