Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A new provably secure certificateless short signature scheme

Full metadata record
DC Field Value Language
dc.contributor.authorChoi, Kyu Young-
dc.contributor.authorPark, Jong Hwan-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-07T13:32:32Z-
dc.date.available2021-09-07T13:32:32Z-
dc.date.created2021-06-14-
dc.date.issued2011-04-
dc.identifier.issn0898-1221-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/112709-
dc.description.abstractCertificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography. In 2007, Huang et al. revisited the security models of certificateless signature scheme. They classified adversaries according to their attack power into normal, strong, and super adversaries (ordered by their attack power). Recently, Du and Wen proposed a short certificateless signature scheme and presented that their scheme is secure against the strong adversary in the random oracle model. In this paper, we show that their short signature scheme is insecure against the strong adversary. We then propose a new short certificateless signature scheme which is secure against the super adversary. Our scheme is the first certificateless signature scheme which satisfies both the strongest security level and the shortest signature length. (C) 2011 Elsevier Ltd. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherPERGAMON-ELSEVIER SCIENCE LTD-
dc.subjectGENERIC CONSTRUCTION-
dc.subjectRANDOM ORACLES-
dc.subjectEFFICIENT-
dc.titleA new provably secure certificateless short signature scheme-
dc.typeArticle-
dc.contributor.affiliatedAuthorChoi, Kyu Young-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1016/j.camwa.2011.02.003-
dc.identifier.scopusid2-s2.0-79952987257-
dc.identifier.wosid000289706900006-
dc.identifier.bibliographicCitationCOMPUTERS & MATHEMATICS WITH APPLICATIONS, v.61, no.7, pp.1760 - 1768-
dc.relation.isPartOfCOMPUTERS & MATHEMATICS WITH APPLICATIONS-
dc.citation.titleCOMPUTERS & MATHEMATICS WITH APPLICATIONS-
dc.citation.volume61-
dc.citation.number7-
dc.citation.startPage1760-
dc.citation.endPage1768-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalWebOfScienceCategoryMathematics, Applied-
dc.subject.keywordPlusGENERIC CONSTRUCTION-
dc.subject.keywordPlusRANDOM ORACLES-
dc.subject.keywordPlusEFFICIENT-
dc.subject.keywordAuthorCertificateless signature-
dc.subject.keywordAuthorShort signature-
dc.subject.keywordAuthorBilinear maps-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE