|
|
Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings
|
|
|
|
|
نویسنده
|
Islam SK Hafizul ,Biswas G.P.
|
منبع
|
journal of king saud university - computer and information sciences - 2013 - دوره : 25 - شماره : 1 - صفحه:51 -61
|
چکیده
|
Diffie and hellman first invented the public key cryptosystem (pkc) wherein the public key infrastructure (pki) is used for the management of public keys; however, the pki-based cryptosystems suffer from heavy management trouble of public keys and certificates. an alternative solution to the pki is shamir’s identity-based cryptosystems (ibc), which eliminate the need of public key certificates; however, the most important shortcoming of ibc is the key escrow problem. to cope with these problems, al-riyami and paterson proposed a novel scheme of certificateless pkc (cl-pkc) by combining the advantages of pki and ibc. since then, several certificateless signature schemes have been designed and most of them have been analyzed and proven insecure against different types of adversaries. besides, the researchers have given very less attention to the certificateless strong designated verifier signature (cl-sdvs) scheme. therefore, we proposed a cl-sdvs scheme using elliptic curve bilinear parings in this paper. our scheme, which is provably secure in the random oracle model with the intractability of bdh and cdh assumptions, supports all desirable security necessities of the cl-sdvs scheme such as strongness, source hiding and non-delegatability. the rigorous security analysis and comparison with others guarantee the better performance of the proposed scheme.
|
کلیدواژه
|
Certificateless cryptography; Elliptic curve cryptosystem; Designated verifier; Digital signature; Bilinear pairing
|
آدرس
|
Indian School of Mines, Department of Computer Science and Engineering, India, Indian School of Mines, Department of Computer Science and Engineering, India
|
پست الکترونیکی
|
gpbiswas@gmail.com
|
|
|
|
|
|
|
|
|
|
|
|
Authors
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|