2006
DOI: 10.1007/11807964_33
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Certificateless Signature Scheme

Abstract: Abstract. Certificateless public key cryptography (CLPKC) is a paradigm to solve the inherent key escrow problem suffered by identity-based cryptography (IBC). While certificateless signature is one of the most important security primitives in CLPKC, there are relatively few proposed schemes in the literature. In this paper, we manage to construct an efficient certificateless signature scheme based on the intractability of the computational Diffie-Hellman problem. By using a shorter public key, two pairing com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
64
0
1

Year Published

2007
2007
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 79 publications
(65 citation statements)
references
References 15 publications
0
64
0
1
Order By: Relevance
“…And hence, C has successfully obtains the solution of DL problem. Table 1 gives a comparison of computational efforts required for our scheme with that of the signature schemes in [7,9,10,17,21] in the Sign and Verify algorithms. Here we only consider the costly operations which defined below, and we omit the computational effort of the hash operation H(ID) in the Sign algorithm, since it can be computed only once.…”
Section: Theorem 2 Our Scheme Is Existentially Unforgeable Against Tmentioning
confidence: 99%
See 4 more Smart Citations
“…And hence, C has successfully obtains the solution of DL problem. Table 1 gives a comparison of computational efforts required for our scheme with that of the signature schemes in [7,9,10,17,21] in the Sign and Verify algorithms. Here we only consider the costly operations which defined below, and we omit the computational effort of the hash operation H(ID) in the Sign algorithm, since it can be computed only once.…”
Section: Theorem 2 Our Scheme Is Existentially Unforgeable Against Tmentioning
confidence: 99%
“…Here we only consider the costly operations which defined below, and we omit the computational effort of the hash operation H(ID) in the Sign algorithm, since it can be computed only once. Schemes Sign Verify Scheme in [7] 2S 3P + 1S + 1H Scheme in [9] 2P + 3S 4P + 1H + 1E Scheme in [10] 2S + 1H 4P + 1S + 2H Scheme in [17] 2S 2P + 1S + 1H Scheme in [21] 3S + 2H 4P + 3H Our Scheme 1S + 2E 1P + 1S + 2E P : Pairing Operation S: Scalar Multiplication in G1 H: MapToPoint Hash E: Exponentiation in G2 Our Sign algorithm requires no pairing operation and two exponentiation operations in G 2 . Our Verify algorithm requires only one pairing operation, much less than it is required in the Verify algorithms of the other schemes [7,9,10,17,21].…”
Section: Theorem 2 Our Scheme Is Existentially Unforgeable Against Tmentioning
confidence: 99%
See 3 more Smart Citations