1.Department of Electronics and Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing 100070, China 2.Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, Beijing 100070, China
Contact:
YU Shuhan, born in 1999, M. S. candidate. His research interests include cryptographic protocol design and analysis, cryptography application and evaluation.
About author:ZHAO Hong, born in 1978, Ph. D. candidate, lecturer. His research interests include cryptographic protocol design and analysis;HAN Yanyan, born in 1982, Ph. D., research associate. Her research interests include information hiding, visual cryptography, blockchain;LI Zhaobin, born in 1977, Ph. D., research associate. His research interests include cryptography application and evaluation;
Supported by:
This work is partially supported by Beijing University Advanced Discipline Construction Project (20210048Z0402).
ZHAO Hong, YU Shuhan, HAN Yanyan, LI Zhaobin. Analysis and improvement of certificateless signature scheme[J]. Journal of Computer Applications, 2023, 43(1): 147-153.
1 AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]// Proceedings of the 2003 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2894. Cham: Springer, 2003: 452-473. 2 YUM D H, LEE P J. Generic construction of certificateless signature[C]// Proceedings of the 2004 Australasian Conference on Information Security and Privacy, LNCS 3108. Cham: Springer, 2004: 200-211. 3 HUANG X Y, SUSILO W, MU Y, et al. On the security of certificateless signature schemes from Asiacrypt 2003[C]// Proceedings of the 2005 International Conference on Cryptology and Network Security, LNCS 3810. Cham: Springer, 2005: 13-25. 4 YAP W S, HENG S H, GOI B M. An efficient certificateless signature scheme[C]// Proceedings of the 2006 International Conference on Embedded and Ubiquitous Computing, LNCS 4097. Cham: Springer, 2006:322-331. 5 LIU J K, AU M H, SUSILO W. Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model: extended abstract[C]// Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2007: 273-283. 10.1145/1229285.1266994 6 王圣宝,刘文浩,谢琪.无双线性配对的无证书签名方案[J].通信学报,2012,33(4):93-98. 10.3969/j.issn.1000-436X.2012.04.013 WANG S B,LIU W H,XIE Q. Certificateless signature scheme without bilinear pairings[J]. Journal on Communications, 2012, 33(4): 93-98. 10.3969/j.issn.1000-436X.2012.04.013 7 王亚飞,张睿哲.强安全无对的无证书签名方案[J].通信学报,2013,34(2):94-99,108. WANG Y F,ZHANG R Z.Strongly secure certificateless signature scheme without pairings[J]. Journal on Communications, 2013, 34(2): 94-99,108. 8 樊爱宛,杨照峰,谢丽明.强安全无证书签名方案的安全性分析和改进[J].通信学报,2014,35(5):118-123. 10.3969/j.issn.1000-436x.2014.05.016 FAN A W,YANG Z F,XIE L M. Security analysis and improvement of strongly secure certificateless signature scheme[J]. Journal on Communications, 2014, 33(5): 118-123. 10.3969/j.issn.1000-436x.2014.05.016 9 汤永利,王菲菲,叶青,等.改进的可证明安全无证书签名方案[J].北京邮电大学学报,2016,39(1):112-116. 10.13190/j.jbupt.2016.01.021 TANG Y L, WANG F F, YE Q, et al. Improved provably secure certificateless signature scheme[J]. Journal of Beijing University of Posts and Telecommunications, 2016, 39(1): 112-116. 10.13190/j.jbupt.2016.01.021 10 王菁,李祖猛.几个无证书签名方案的伪造攻击[J].网络与信息安全学报,2020,6(3):108-112. 10.11959/j.issn.2096-109x.2020039 WANG J, LI Z M. Forgery attacks on several certificateless signature schemes[J]. Chinese Journal of Network and Information Security, 2020, 6(3): 108-112. 10.11959/j.issn.2096-109x.2020039 11 胡冰洁,周彦伟,杨波,等.安全高效的无双线性对的无证书签名方案[J].云南大学学报(自然科学版),2021,43(3):462-469. HU B J, ZHOU Y W, YANG B, et al. Secure and efficient certificateless signature scheme without bilinear pairs [J]. Journal of Yunnan University (Natural Sciences Edition), 2021, 43(3): 462-469. 12 张振超,刘亚丽,殷新春,等.无证书签名方案的分析及改进[J].密码学报,2020,7(3):389-403. 10.13868/j.cnki.jcr.000375 ZHANG Z C, LIU Y L, YIN X C, et al. Analysis and improvement of certificateless signature schemes[J]. Journal of Cryptologic Research, 2020, 7(3): 389-403. 10.13868/j.cnki.jcr.000375 13 JIA X Y, HE D B, LIU Q, et al. An efficient provably-secure certificateless signature scheme for Internet-of-things deployment[J]. Ad Hoc Networks, 2018, 71: 78-87. 10.1016/j.adhoc.2018.01.001 14 SHIM K A. Security models for certificateless signature schemes revisited[J]. Information Sciences, 2015, 296: 315-321. 10.1016/j.ins.2014.10.055 15 ZHANG Z C, LIU Y L, YIN X C, et al. A new pairing-free certificateless signature scheme for Internet of Things[C]// Proceedings of the 2019 International Conference on Science of Cyber Security, LNCS 11933. Cham: Springer, 2019: 371-379. 16 DU H Z, WEN Q Y, ZHANG S S, et al. A new provably secure certificateless signature scheme for Internet of Things[J]. Ad Hoc Networks, 2020, 100: 102074. 10.1016/j.adhoc.2020.102074 17 SHIM K A. Universal forgery attacks on remote authentication schemes for wireless body area networks based on Internet of Things[J]. IEEE Internet of Things Journal, 2019, 6(5): 9211-9212. 10.1109/jiot.2019.2922701 18 ZHANG Y, DENG R, ZHENG D, et al. Efficient and robust certificateless signature for data crowd sensing in cloud-assisted industrial IoT[J]. IEEE Transactions on Industrial Informatics, 2019, 15(9): 5099-5108. 10.1109/tii.2019.2894108 19 王菲菲. 可证明安全的无证书数字签名研究[D]. 焦作:河南理工大学, 2016:3-20. WANG F F. Research on provably secure certificateless signature schemes[D]. Jiaozuo: Henan Polytechnic University, 2016:3-20. 20 汤永利,王菲菲,闫玺玺,等.高效可证明安全的无证书签名方案[J].计算机工程,2016,42(3):156-160. 10.3969/j.issn.1000-3428.2016.03.028 TANG Y L, WANG F F, YAN X X, et al. Efficient and provably secure certificateless signature schemes[J]. Computer Engineering, 2016,42(3): 156-160. 10.3969/j.issn.1000-3428.2016.03.028 21 YUAN Y M, LI D, TIAN L W, et al. Certificateless signature scheme without random oracles[C]// Proceedings of the 2009 International Conference on Information Security and Assurance, LNCS 5576. Cham: Springer, 2009: 31-40. 22 POINTCHEVAL D,STERN J. Security proofs for signature schemes[C]// Proceedings of the 1996 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 1070. Cham: Springer, 1996: 387-398. 23 HANKERSON D, HERNANDEZ J. Software implementation of elliptic curve cryptography over binary fields[C]// Proceedings of the 2000 International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 1965. Cham: Springer, 2000: 1-24.