Skip to main content
Log in

Certificateless signature and proxy signature schemes from bilinear pairings

  • Published:
Lithuanian Mathematical Journal Aims and scope Submit manuscript

Abstract

Due to avoiding the inherent escrow of identity-based cryptography and yet not requiring certificates to guarantee the authenticity of public keys, certificateless public key cryptography has received a significant attention. Due to various applications of bilinear pairings in cryptography, numerous pairing-based encryption schemes, signature schemes, and other cryptographic primitives have been proposed. In this paper, a new certificateless signature scheme based on bilinear pairings is presented. The signing algorithm of the proposed scheme is very simple and does not require any pairing computation. Combining our signature scheme with certificateless public key cryptography yields a complete solution of certificateless public key system. As an application of the proposed signature scheme, a certificateless proxy signature scheme is also presented. We analyze both schemes from security point of view.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

REFERENCES

  1. S. Al-Riyami and K. Paterson, Certificateless public key cryptography, in: Proc. Asiacrypt 2003, LNCS 2894 (2003), pp. 452–473.

  2. P. Barreto, H. Kim, B. Lynn, and M. Scott, Efficient algorithms for pairing-based cryptosystems, in: Proc. CRYPTO 2002, LNCS 2442 (2002), pp. 354–368.

  3. D. Boneh, B. Lynn, and H. Shacham, Short signatures from the weil pairings, in: Proc. Asiacrypt 2001, LNCS 2248 (2001), pp. 514–532.

  4. J. Cha and J. Cheon, An identity-based signature from Gap Diffie-Hellman groups. Cryptology ePrint Archive: Report 2002/018. eprint.iacr.org/2002/018/.

  5. S. Galbraith, K. Harrison, and D. Soldera, Implementing the Tate pairing, in: Proc. of Algorithmic Number Theory 5th International Symposium, ANTS-V, LNCS 2369 (2002), pp. 324–337.

  6. F. Hess, Efficient identity based signature schemes based on pairings, in: Proc. of 9th Workshop on Selected Areas in Cryptography, SAC2002, LNCS 2595, Springer (2003), pp. 310–324.

  7. S. Kim, S. Park, and D. Won, Proxy signatures, revisited, in: Proc. ICICS97, International Conference on Information and Communications Security, LNCS 1334 (1997), pp. 223–232.

  8. B. Lee, H. Kim, and K. Kim, Strong proxy signature and its applications, in: Proc. of SCIS 2001 (2001), pp. 603–608.

  9. Y. Lee and H. Lee, An authenticated certificateless public key encryption scheme, Cryptology ePrint Archive: Report 2004/150. Available at: eprint.iacr.org/2004/150/.

  10. M. Mambo, K. Usuda, and E. Okamoto, Proxy signature: delegation of the power to sign messages, IEICE Trans. Fundamentals, E79-A:9, 1338–1353 (1996).

    Google Scholar 

  11. M. Mambo, K. Usuda, and E. Okamoto, Proxy signature for delegating signing opertion, in: Proc. of 3rd ACM Conference on Computer and Communications Security, ACM Press, New York (1996), pp. 48–57.

    Google Scholar 

  12. T. Okamoto and D. Pointcheval, The gap-problems: a new class of problems for the security of cryptographic schemes, in: Proc. of PKC 2001, LNCS 1992 (2001), pp. 104–118.

  13. K. Paterson, ID-based signatures from pairings on elliptic curves, Electronics Letters, 38487, 1025–1020, January (1999).

    Google Scholar 

  14. A. Shamir, Identity-based cryptosystems and signature schemes, in: Advances in Cryptology — CRYPTO’84 LNCS 196, Springer (1984), pp. 47–53.

  15. D. Yum and P. Lee, Generic construction of certificateless signature, in: Proc. ACISP 2004, LNCS 3108 (2004), pp. 200–211.

  16. F. Zhang, R. Safavi-Naini, and C. Lin, New proxy signature, proxy blind signature, proxy ring signature schemes from bilinear pairings, Cryptology ePrint Archive: Report 2003/104: http://eprint.iacr.org/2003/104/.

Download references

Author information

Authors and Affiliations

Authors

Additional information

__________

Published in Lietuvos Matematikos Rinkinys, Vol. 45, No. 1, pp. 95–103, January–March, 2005.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, X., Chen, K. & Sun, L. Certificateless signature and proxy signature schemes from bilinear pairings. Lith Math J 45, 76–83 (2005). https://doi.org/10.1007/s10986-005-0008-5

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10986-005-0008-5

Keywords

Navigation