196
Views
2
CrossRef citations to date
0
Altmetric
SECTION A

A provable secure pairing-free certificateless identification scheme

, , , &
Pages 1520-1535 | Received 08 Nov 2013, Accepted 18 Aug 2014, Published online: 03 Oct 2014

References

  • S.S. Al-Riyami and K.G. Paterson, Certificateless public key cryptography, in ASIACRYPT, Taipei, Taiwan, Lecture Notes in Computer Science, Vol. 2894, C.-S. Laih, ed., Springer, Berlin, Heidelberg, 2003, pp. 452–473.
  • M. Bellare and A. Palacio, GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks, in CRYPTO, Santa Barbara, California, Lecture Notes in Computer Science, Vol. 2442, M. Yung, ed., Springer, Berlin, Heidelberg, 2002, pp. 162–177.
  • M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko, The one-more-rsa-inversion problems and the security of Chaum's blind signature scheme, J. Cryptol. 16 (2003), pp. 185–215. doi: 10.1007/s00145-002-0120-1
  • M. Bellare, C. Namprempre and G. Neven, Security proofs for identity-based identification and signature schemes, in EUROCRYPT, Interlaken, Switzerland, Lecture Notes in Computer Science, Vol. 3027, C. Cachin and J. Camenisch, eds., Springer, Berlin, Heidelberg, 2004, pp. 268–286.
  • J.J. Chin, R.C.W. Phan, R. Behnia and S.H. Heng, An efficient and provably secure certificateless identification scheme, in SECRYPT, Rejkavik, Iceland, P. Samarati, ed., SciTePress, Lisbon, 2013, pp. 371–378.
  • J.J. Chin, R. Behnia, S.H. Heng and R.C.W. Phan, Cryptanalysis of a certificateless identification scheme, Secur. Commun. Networks (2014). Available at http://dx.doi.org/10.1002/sec.963.
  • I. Damgård, Towards practical public key systems secure against chosen ciphertext attacks, in CRYPTO, Santa Barbara, California, Lecture Notes in Computer Science, Vol. 576, J. Feigenbaum, ed., Springer, Berlin, Heidelberg, 1991, pp. 445–456.
  • M.H. Dehkordi and R. Alimoradi, Certificateless identification protocols from super singular elliptic curve, Secur. Commun. Networks 7(6) (2014), pp. 979–986.
  • A.W. Dent, A survey of certificateless encryption schemes and security models, Int. J. Inf. Secur. 7 (2008), pp. 349–377. doi: 10.1007/s10207-008-0055-0
  • D. He, S. Padhye, and J. Chen, An efficient certificateless two-party authenticated key agreement protocol, Comput. Math. Appl. 64 (2012), pp. 1914–1926. doi: 10.1016/j.camwa.2012.03.044
  • D. He, Y. Chen and J. Chen, An efficient certificateless proxy signature scheme without pairing, Math. Comput. Model. 57 (2013), pp. 2510–2518. doi: 10.1016/j.mcm.2012.12.037
  • X. Huang, Y. Mu, W. Susilo, D.S. Wong and W. Wu, Certificateless signature revisited, in ACISP, Townsville, Australia, Lecture Notes in Computer Science, Vol. 4586, J. Pieprzyk, H. Ghodosi, and E. Dawson, eds., Springer, Berlin, Heidelberg, 2007, pp. 308–322.
  • K. Kurosawa and S.H. Heng, From digital signature to ID-based identification/signature, in Public Key Cryptography, Singapore, Lecture Notes in Computer Science, Vol. 2947, F. Bao, R.H. Deng, and J. Zhou, eds., Springer, Berlin, Heidelberg, 2004, pp. 248–261.
  • C.P. Schnorr, Efficient identification and signatures for smart cards, in CRYPTO, Santa Barbara, California, Lecture Notes in Computer Science, Vol. 435, G. Brassard, ed., Springer, Berlin, Heidelberg, 1989, pp. 239–252.
  • A. Shamir, Identity-based cryptosystems and signature schemes, in CRYPTO, Santa Barbara, California, Lecture Notes in Computer Science, Vol. 196, G. R. Blakley and D. Chaum, eds., Springer, Berlin, Heidelberg, 1984, pp. 47–53.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.