244
Views
9
CrossRef citations to date
0
Altmetric
Review Articles

A Survey on Security of Certificateless Signature Schemes

&

References

  • T. ElGamal, “A public-key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. Inf Theory, Vol. 31, no. 4, pp. 469–72, July 1985.
  • R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, Vol. 21, no. 2, pp. 120–6, Feb. 1978.
  • A. Shamir, “Identity-based cryptosystems and signature schemes,” in Proceedings of CRYPTO 1984, Lecture Notes in Computer Science 196, Springer, Santa Barbara, CA, 1985, pp. 19–22.
  • S. S. Al-Riyami, and K. G. Paterson, “Certificateless public key cryptography,” in Proceedings of ASIACRYPT 2003, Lecture Notes in Computer Science 2894, Springer, Taipei, 2003, pp. 452–73.
  • M. A. Moharrum, and A. A. Al-Daraiseh, “Toward secure vehicular Ad-hoc networks: A survey,” IETE Tech. Rev., Vol. 29, no. 1, pp. 80–9, Jan. 2012.
  • J. Xu, X. Zhou, J. Han, F. Li, and F. Zhou, “Data authentication model based on reed-solomon error-correcting codes in wireless sensor networks,” IETE Tech. Rev., Vol. 30, no. 3, pp. 191–9, May 2013.
  • A. W. Dent, “A survey of certificateless encryption schemes and security models,” Int. J. Inf. Secur., Vol. 7, no. 5, pp. 349–77, May 2008.
  • D. Fiore, R. Gennaro, and N. P. Smart, “Relations between the security models for certificateless encryption and ID-based key agreement,” Int. J. Inf. Secur., Vol. 11, no. 1, pp. 1–22, Oct. 2012.
  • Y. H. Hwang, J. K. Liu, and S. S. M. Chow, “Certificateless public key encryption secure against malicious KGC attacks in the standard model,” J. Univer. Comput. Sci., Vol. 14, no. 3, pp. 463–80, Feb. 2008.
  • G. Yang, and C. H. Tan, “Certificateless public key encryption: A new generic construction and two pairing-free schemes,” Theor. Comput. Sci., Vol. 412, no. 8–10, pp. 662–74, Mar. 2011.
  • X. Huang, W. Susilo, Y. Mu, and F. Zhang, “On the security of certificateless signature schemes from Asiacrypt 2003,” in Proceedings of CANS 2005, Lecture Notes in Computer Science 3810, Springer, Xiamen, 2005, pp. 13–25.
  • D. H. Yum, and P. J. Lee, “Generic construction of certificateless signature,” In Proceedings of ACISP 2004, Lecture Notes in Computer Science 3108, Springer, Sydney, 2004, pp. 200–11.
  • B. C. Hu, D. S. Wong, Z. Zhang, and X Deng, “Key replacement attack against a generic construction of certificateless signature,” in Proceedings of ACISP 2006, Lecture Notes in Computer Science 4058, Springer, Melbourne, 2006, pp. 235–246.
  • B. C. Hu, D. S. Wong, Z. Zhang, and X Deng, “Certificateless signature: A new security model and an improved generic construction,” Designs, Codes Cryptography, Vol. 42, no. 2, pp. 109–26, Feb. 2007.
  • X. Huang, Y. Mu, W. Susilo, D. S. Wong, and W Wu, “Certificateless signature revisited,” in Proceedings of ACISP 2007, Lecture Notes in Computer Science 4586, Springer, Townsville, 2007, pp. 308–22.
  • X. Huang, Y. Mu, W. Susilo, D. S. Wong, and W Wu, “Certificateless signatures: New schemes and security models,” Computer J., Vol. 55, no. 4, pp. 457–74, Apr. 2012.
  • R. Tso, X. Huang, and W. Susilo, “Strongly secure certificateless short signatures,” J. Syst. Softw., Vol. 85, no. 6, pp. 1409–17, June 2012.
  • M. C. Gorantla, and A. Saxena, “An efficient certificateless signature scheme,” in Proceedings of CSI 2005, Lecture Notes in Computer Science 3802, Springer, Las Vegas, NV, 2005, pp. 110–16.
  • X. Li, K. Chen, and L. Sun, “Certificateless signature and proxy signature schemes from bilinear pairings,” Lith. Math. J., Vol. 45, no. 1, pp. 76–83, Jan. 2005.
  • W. S. Yap, S. H. Heng, and B. M. Goi, “An efficient certificateless signature scheme,” in Proceedings of EUC 2006, Lecture Notes in Computer Science 4097, Springer, Seoul, 2006, pp. 322–31.
  • Z. Zhang, D. S. Wong, J. Xu, and D. Feng, “Certificateless public-key signature: Security model and efficient construction,” in Proceedings of the ACNS 2006, Lecture Notes in Computer Science 4058, Springer, Melbourne, 2006, pp. 293–308.
  • L. Wang, Z. Cao, X. Li, and H. Qian, “Simulatability and security of certificateless threshold signatures,” Inf. Sci., Vol. 177, no. 6, pp. 1382–94, Mar. 2007.
  • S. Chang, D. S. Wong, Y. Mu, and Z. Zhang, “Certificateless threshold ring signature,” Inf. Sci., Vol. 179, no. 20, pp. 3685–96, Sept. 2009.
  • S. Duan, “Certificateless undeniable signature scheme,” Inf. Sci., Vol. 178, no. 3, pp. 742–55, Feb. 2008.
  • H. Yuan, F. Zhang, X. Huang, Y. Mu, W. Susilo, and L. Zhang, “Certificateless threshold signature scheme from bilinear maps,” Inf. Sci., Vol. 180, no. 23, pp. 4714–28, Dec. 2010.
  • Y. C. Chen, C. L. Liu, G. Horng, and K. C. Chen, “A provably secure certificateless proxy signature scheme,” Int. J. Innov. Comput., Inf. Control, Vol. 7, no. 9, pp. 5557–69, Sept. 2011.
  • S. H. Seo, K. Y. Choi, J. Y. Hwang, and S. Kim, “Efficient certificateless proxy signature scheme with provable security,” Inf. Sci., Vol. 188, no. 1, pp. 322–37, Apr. 2010.
  • Y. C. Chen, R. Tso, G. Horng, C. I. Fan, and R. H. Hsu, “Strongly secure certificateless signature: Cryptanalysis and improvement of two schemes,” J. Inf. Sci. Eng., Vol. 31, no. 1, pp. 283–96, Jan. 2015.
  • K. Y. Choi, J. H. Park, and D. H. Lee, “A new provably secure certificateless short signature scheme,” Comput Math Appl., Vol. 61, no. 7, pp. 1760–8, Apr. 2011.
  • H. Du, and Q. Wen, “Efficient and provably-secure certificateless short signature scheme from bilinear pairings,” Comput. Stand. Interfaces, Vol. 31, no. 2, pp. 390–4, Feb. 2009.
  • L. Zhang, and F. Zhang, “A new provably secure certificateless signature scheme,” in IEEE International Conference on Communications, Beijing, 2008, pp. 1685–9.
  • R. Tso, X. Yi, and X. Huang, “Efficient and short certificateless signatures secure against realistic adversaries,” J. Supercomput., Vol. 55, no. 2, pp. 173–91, Feb. 2011.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.