244
Views
9
CrossRef citations to date
0
Altmetric
Review Articles

A Survey on Security of Certificateless Signature Schemes

&
Pages 115-121 | Published online: 24 Jul 2015
 

Abstract

In cryptography, security models play important roles to define the security with potential attacks. Following the security models, a scheme is analysed to be secure or insecure against those considered attacks. However, certificateless signatures (CLSs) are well-known notions to solve the key escrow problem of identity-based signatures, but the adversaries’ attack power is not well defined. In typical CLS setting, the full private key is composed of two parts that are respectively generated by two different parties, and therefore, the security models will be more complicate than other systems. In general, there are two types of adversaries in CLS, and further can be extended into many security levels due to attack power. In this paper, a comprehensive study focuses on the security models of CLSs. We not only consider two security issues, public key replacement, and strong unforgeability, but also revisit all feasible and potential adversaries’ abilities. According to the research results, we show the generalization of security models which consists of all cases of the adversaries. Finally, we give a security comparison with literature works.

Notes

1. In cryptography, the oracles are used to respond to the adversaries’ queries, i.e. an adversary submit to Sign oracle, and then Sign will return a signature of .

2. We give two weaker versions of two schemes [Citation17,Citation31], where they only withstand the weaker adversaries. They are similar to the original schemes, but the hash function with input message and public key will become that with input message only. Roughly, we can get a weaker scheme according to the very simple transformation. However, in , we only carefully address Type I adversaries, since these schemes [Citation16,Citation17,Citation28–32] are all secure against S-Type II adversary. These schemes have identical signature size and almost the same time for , so we do not further compare them regarding efficiency.

Additional information

Notes on contributors

Yu-Chi Chen

Yu-Chi Chen received his BS, MS, and PhD degrees from the Department of Computer Science and Engineering, National Chung-Hsing University, Taiwan in 2008, 2009 and 2013, respectively. He is currently a postdoctoral fellow in the Institute of Information Science, Academia Sinica, Taiwan. His research interests include cryptography and information security.

E-mail: [email protected]

Raylin Tso

Raylin Tso is an associate professor of computer science at National Chengchi University, Taiwan. He received his PhD degree in systems and information engineering from the University of Tsukuba, Japan in 2006. His research interests are mainly in cryptography including secret sharing, key agreement, digital signatures, certificateless cryptosystems, etc.

E-mail: [email protected]

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 182.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.