An Efficient and Provably Secure Certificateless Identification Scheme

Ji-Jian Chin, Raphael C.-W. Phan, Rouzbeh Behnia, Swee-Huay Heng

2013

Abstract

Identity-based identification, first formalized independently by Bellare et al. and Kurosawa and Heng in 2004, still had the inherent key escrow problem, as the TA generating the user secret keys had full access to every user’s secret key. In 2003, Al-Riyami and Paterson introduced the notion of certificateless cryptography, and subsequently many certificateless encryption, signature and other schemes were introduced in literature. However, to this date there are still no certificateless identification schemes in existence. Therefore, in this paper, we formalize the notion of certificateless identification schemes and construct the first concrete certificateless identification scheme.

References

  1. Al-Riyami, S. S. and Paterson, K. G. (2003). Certificateless Public Key Cryptography. In Laih, C.-S., editor, ASIACRYPT, volume 2894 of Lecture Notes in Computer Science, pages 452-473. Springer.
  2. Bellare, M., Namprempre, C., and Neven, G. (2004). Security Proofs for Identity-Based Identification and Signature Schemes. In Cachin, C. and Camenisch, J., editors, EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages 268-286. Springer.
  3. Bellare, M. and Palacio, A. (2004). The Knowledge-ofExponent Assumptions and 3-round Zero-Knowledge Protocols. In Franklin, M. K., editor, CRYPTO, volume 3152 of Lecture Notes in Computer Science, pages 273-289. Springer.
  4. Boldyreva, A. (2003). Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-DiffieHellman-Group Signature Scheme. In Desmedt, Y., editor, Public Key Cryptography, volume 2567 of Lecture Notes in Computer Science, pages 31-46. Springer.
  5. Chen, Y.-C., Tso, R., and Horng, G. (2013). Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme. In Advances in Intelligent Systems and Applications-Volume 2, pages 61-68. Springer.
  6. Chin, J.-J., Heng, S.-H., and Goi, B.-M. (2009). Hierarchical Identity-Based Identification Schemes. In Slezak, D., Kim, T.-H., Fang, W.-C., and Arnett, K. P., editors, FGIT-SecTech, volume 58 of Communications in Computer and Information Science, pages 93-99. Springer.
  7. Damga°rd, I. (1991). Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks. In Feigenbaum, J., editor, CRYPTO, volume 576 of Lecture Notes in Computer Science, pages 445-456. Springer.
  8. Dent, A. W. (2008). A Survey of Certificateless Encryption Schemes and Security Models. Int. J. Inf. Sec., 7(5):349-377.
  9. Fan, C., Hsu, R.-H., and Ho, P.-H. (2009). Cryptanalysis on Du-Wen Certificateless Short Signature Scheme. Proceedings of JWIS09. Available at http://jwis2009. nsysu. edu. tw/location/paper/Cryptanalysis.
  10. Fiat, A. and Shamir, A. (1986). How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In Odlyzko, A. M., editor, CRYPTO, volume 263 of Lecture Notes in Computer Science, pages 186-194. Springer.
  11. Girault, M. (1991). Self-Certified Public Keys. In Davies, D. W., editor, EUROCRYPT, volume 547 of Lecture Notes in Computer Science, pages 490-497. Springer.
  12. He, D., Chen, J., and Zhang, R. (2012). An Efficient and Provably-Secure Certificateless Signature Scheme without Bilinear Pairings. International Journal of Communication Systems, 25(11):1432-1442.
  13. Hu, B. C., Wong, D. S., Zhang, Z., and Deng, X. (2007). Certificateless Signature: A New Security Model and an improved Generic Construction. Des. Codes Cryptography, 42(2):109-126.
  14. Huang, X., Mu, Y., Susilo, W., Wong, D. S., and Wu, W. (2007). Certificateless Signatures Revisited. In Pieprzyk, J., Ghodosi, H., and Dawson, E., editors, ACISP, volume 4586 of Lecture Notes in Computer Science, pages 308-322. Springer.
  15. Huang, X., Mu, Y., Susilo, W., Wong, D. S., and Wu, W. (2012). Certificateless Signatures: New Schemes and Security Models. Comput. J., 55(4):457-474.
  16. Huang, X., Susilo, W., Mu, Y., and Zhang, F. (2005). On the Security of Certificateless Signature Schemes from Asiacrypt 2003. In Desmedt, Y., Wang, H., Mu, Y., and Li, Y., editors, CANS, volume 3810 of Lecture Notes in Computer Science, pages 13-25. Springer.
  17. Kurosawa, K. and Heng, S.-H. (2004). From Digital Signature to ID-based Identification/Signature. In Bao, F., Deng, R. H., and Zhou, J., editors, Public Key Cryptography, volume 2947 of Lecture Notes in Computer Science, pages 248-261. Springer.
  18. Kurosawa, K. and Heng, S.-H. (2005). Identity-Based Identification Without Random Oracles. In Gervasi, O., Gavrilova, M. L., Kumar, V., Laganà, A., Lee, H. P., Mun, Y., Taniar, D., and Tan, C. J. K., editors, ICCSA (2), volume 3481 of Lecture Notes in Computer Science, pages 603-613. Springer.
  19. Shamir, A. (1984). Identity-Based Cryptosystems and Signature Schemes. In Blakley, G. R. and Chaum, D., editors, CRYPTO, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer.
  20. Thorncharoensri, P., Susilo, W., and Mu, Y. (2009). Identity-based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. In Youm, H. Y. and Yung, M., editors, WISA, volume 5932 of Lecture Notes in Computer Science, pages 94-108. Springer.
  21. Tian, M. and Huang, L. (2012). Cryptanalysis of a Certificateless Signature Scheme without Pairings. International Journal of Communication Systems, pages n/an/a.
  22. Tso, R., Huang, X., and Susilo, W. (2012). Strongly Secure Certificateless Short Signatures. Journal of Systems and Software, 85(6):1409-1417.
  23. Tso, R., Yi, X., and Huang, X. (2011). Efficient and Short Certificateless Signatures Secure Against Realistic Adversaries. The Journal of Supercomputing, 55(2):173-191.
  24. Wu, C., Lin, W., Huang, H., and Chen, Z. (2013). Cryptanalysis of Some Certificateless Signature Schemes in the Standard Model. International Journal of Applied Mathematics and Statistics, 36(6):16-25.
  25. Yang, G., Chen, J., Wong, D. S., Deng, X., and Wang, D. (2007). A More Natural Way to Construct IdentityBased Identification schemes. In Katz, J. and Yung, M., editors, ACNS, volume 4521 of Lecture Notes in Computer Science, pages 307-322. Springer.
  26. Zhang, F., Li, S., Miao, S., Mu, Y., Susilo, W., and Huang, X. (2010). Cryptanalysis on Two Certificateless Signature Schemes. International Journal of Computers Communications & Control, 5(4):586-591.
  27. Zhang, J. and Mao, J. (2012). An Efficient RSA-Based Certificateless Signature Scheme. Journal of Systems and Software, 85(3):638-642.
Download


Paper Citation


in Harvard Style

Chin J., C.-W. Phan R., Behnia R. and Heng S. (2013). An Efficient and Provably Secure Certificateless Identification Scheme . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 371-378. DOI: 10.5220/0004526303710378


in Bibtex Style

@conference{secrypt13,
author={Ji-Jian Chin and Raphael C.-W. Phan and Rouzbeh Behnia and Swee-Huay Heng},
title={An Efficient and Provably Secure Certificateless Identification Scheme},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={371-378},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004526303710378},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - An Efficient and Provably Secure Certificateless Identification Scheme
SN - 978-989-8565-73-0
AU - Chin J.
AU - C.-W. Phan R.
AU - Behnia R.
AU - Heng S.
PY - 2013
SP - 371
EP - 378
DO - 10.5220/0004526303710378