2004
DOI: 10.1007/978-3-540-27800-9_18
|View full text |Cite
|
Sign up to set email alerts
|

Generic Construction of Certificateless Signature

Abstract: To provide the binding between a user and his public key, traditional digital signature schemes use certificates that are signed by a trusted third party. While Shamir's identity-based signature scheme can dispense with certificates, the key escrow of a user's private key is inherent in the identity-based signature scheme. In Asiacrypt 2003, a new digital signature paradigm called the certificateless signature was introduced. The certificateless signature eliminates the need for certificates and does not suffe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
118
0

Year Published

2005
2005
2019
2019

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 156 publications
(118 citation statements)
references
References 15 publications
0
118
0
Order By: Relevance
“…Since any certifying information can always be sent along with the actual signature, this concept seems less useful than that of CBE. Yum and Lee [11] gave a generic construction or a certificateless signature scheme from an ID-based signature scheme, proving the former to be secure (in an appropriate model) if the latter is. These authors also considered a generic construction for CL-PKE from identity-based encryption (IBE) [10] and the relationships between IBE, CBE and CL-PKE [12].…”
Section: Related Workmentioning
confidence: 99%
“…Since any certifying information can always be sent along with the actual signature, this concept seems less useful than that of CBE. Yum and Lee [11] gave a generic construction or a certificateless signature scheme from an ID-based signature scheme, proving the former to be secure (in an appropriate model) if the latter is. These authors also considered a generic construction for CL-PKE from identity-based encryption (IBE) [10] and the relationships between IBE, CBE and CL-PKE [12].…”
Section: Related Workmentioning
confidence: 99%
“…In this cryptosystem, the private key consists of two parts which one of them is made by the user and the other is made by KGC. Up to now, various types of certificateless cryptographic primitives as encryption functions [20], signature schemes [21], key agreement protocols [19] and so on, have been designed.…”
Section: Introductionmentioning
confidence: 99%
“…A subsequent work of Yum and Lee considered the relations between identity-based (IBE), certificate based (CBE) and certificateless encryption schemes (CLE) and established a result of essential equivalence [31] between the three primitives but this result does not hold for the strongest security model developed in [2] for CLE schemes. The same authors also proposed generic constructions of certificateless signatures [30] and encryption schemes [29] but only established the security of their designs in security models that are seemingly undermined w.r.t. the original model considered in [2] for the public key encryption case.…”
Section: Introductionmentioning
confidence: 99%