Certificate-Based Signature Schemes without Pairings or Random Oracles
ISC '08 Proceedings of the 11th international conference on Information Security
Information Security Applications
On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Efficient Certificate-Based Signature Scheme
IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 02
An Efficient Certificate-Based Signature Scheme without Pairings
IWCSE '09 Proceedings of the 2009 Second International Workshop on Computer Science and Engineering - Volume 02
Security proofs for signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Certificate based (linkable) ring signature
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Self-generated-certificate public key encryption without pairing
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A certificate-based proxy cryptosystem with revocable proxy decryption power
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Strongly secure certificateless public key encryption without pairing
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Constructions of certificate-based signature secure against key replacement attacks
Journal of Computer Security - The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)
Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
An efficient short certificate-based signature scheme
Journal of Systems and Software
On the security of certificateless signature schemes from asiacrypt 2003
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Certificateless public key encryption without pairing
ISC'05 Proceedings of the 8th international conference on Information Security
Certificate-based signcryption with enhanced security features
Computers & Mathematics with Applications
Certificate-based signature: security model and efficient construction
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
A forward-secure certificate-based signature scheme in the standard model
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Hi-index | 0.07 |
In order to simplify certificate management in traditional public key cryptography and solve the key escrow problem in identity-based cryptography, the notion of certificate-based cryptography was introduced. Recently, Ming and Wang proposed a certificate-based signature scheme without pairings. They claimed that the scheme was existentially unforgeable against adaptive chosen message and identity attacks in the random oracle. In this paper, we show that the scheme is insecure against a malicious certifier under existing security model. We also propose a new efficient certificate-based signature scheme without pairings, which is proven secure in the random oracle model. Compared with the existed certificate-based signature schemes without parings, our scheme enjoys shorter signature length and less operation cost.