By analyzing the security of a certificateless signature scheme without bilinear pairing proposed by Wang Y, et al. (WANG Y, DU W. Security analysis and improvement of certificateless signature scheme without bilinear pairing. Journal of Computer Applications, 2013, 33(8): 2250-2252), the result that the scheme can not resist forgery attack was pointed out and an improved scheme was proposed. The improved scheme enhanced the relationship of parameters in signature algorithm to resist forgery attack. The results of security analysis show that the improved scheme is proved to be existentially unforgeable against adaptive chosen message and identity attacks in random oracle model. The improved scheme is more efficient than the existing schemes for avoiding bilinear pairings and inverse operation.