Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
On the Exact Security of Full Domain Hash
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
On the security of certificateless signature schemes from asiacrypt 2003
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
CBE from CL-PKE: a generic construction and efficient schemes
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Certificateless public key encryption without pairing
ISC'05 Proceedings of the 8th international conference on Information Security
Certificateless signature: a new security model and an improved generic construction
Designs, Codes and Cryptography
Malicious KGC attacks in certificateless cryptography
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Efficient Certificateless Signature Schemes
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Security Mediated Certificateless Signatures
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Breaking the short certificateless signature scheme
Information Sciences: an International Journal
Efficient and provably-secure certificateless short signature scheme from bilinear pairings
Computer Standards & Interfaces
Efficient and Short Certificateless Signature
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
An Improved Certificateless Signature Scheme Secure in the Standard Model
Fundamenta Informaticae
A new certificateless aggregate signature scheme
Computer Communications
Design of DL-based certificateless digital signatures
Journal of Systems and Software
Information Security Applications
Novel Efficient Certificateless Aggregate Signatures
AAECC-18 '09 Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Certificateless Signature Scheme without Random Oracles
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Certificateless Threshold Ring Signature
Information Sciences: an International Journal
Certificateless signature revisited
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Two notes on the security of certificateless signatures
ProvSec'07 Proceedings of the 1st international conference on Provable security
A provably secure ring signature scheme in certificateless cryptography
ProvSec'07 Proceedings of the 1st international conference on Provable security
Security analysis of the certificateless signature scheme proposed at SecUbiq 2006
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
New efficient certificateless signature scheme
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Certificateless encryption schemes strongly secure in the standard model
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Efficient many-to-one authentication with certificateless aggregate signatures
Computer Networks: The International Journal of Computer and Telecommunications Networking
Certificateless threshold signature scheme from bilinear maps
Information Sciences: an International Journal
Efficient and short certificateless signatures secure against realistic adversaries
The Journal of Supercomputing
Self-generated-certificate public key encryption without pairing and its application
Information Sciences: an International Journal
A new provably secure certificateless short signature scheme
Computers & Mathematics with Applications
A traceable certificateless threshold proxy signature scheme from bilinear pairings
APWeb'11 Proceedings of the 13th Asia-Pacific web conference on Web technologies and applications
Delegation of signing rights using certificateless proxy signatures
Information Sciences: an International Journal
Efficient certificateless proxy signature scheme with provable security
Information Sciences: an International Journal
An efficient RSA-based certificateless signature scheme
Journal of Systems and Software
Strongly secure certificateless short signatures
Journal of Systems and Software
Certificateless undeniable signatures from bilinear maps
Information Sciences: an International Journal
Security Pitfalls of the Certificateless Signature and Multi-Receiver Signcryption Schemes
Fundamenta Informaticae
An Improved Certificateless Signature Scheme Secure in the Standard Model
Fundamenta Informaticae
An efficient certificateless aggregate signature with constant pairing computations
Information Sciences: an International Journal
An efficient and provably-secure certificateless signature scheme without bilinear pairings
International Journal of Communication Systems
Certificateless threshold signature secure in the standard model
Information Sciences: an International Journal
Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
Information Sciences: an International Journal
Certificate-free ad hoc anonymous authentication
Information Sciences: an International Journal
Hi-index | 0.00 |
“Certificateless public-key cryptosystem” is a new and attractive paradigm, which avoids the inherent key escrow property in identity-based public-key cryptosystems, and does not need expensive certificates as in the public key infrastructure. A strong security model for certificateless public key encryption was established by Al-Riyami and Paterson in 2003. In this paper, we first present a security model for certificateless public-key signature schemes, and then propose an efficient construction based on bilinear pairings. The security of the proposed scheme can be proved to be equivalent to the computational Diffie-Hellman problem in the random oracle model with a tight reduction.