2014
DOI: 10.1155/2014/728591
|View full text |Cite
|
Sign up to set email alerts
|

Secure Certificateless Signature with Revocation in the Standard Model

Abstract: Certificateless public key cryptography is very attractive in solving the key escrow problem which is inherent in identity- (ID-) based public key cryptography. In the past, a large number of certificateless cryptographic schemes and protocols were presented, but a secure certificateless signature in the standard model (without random oracles) is still not accessible until now. To the best of our knowledge, all the previously proposed certificateless signature schemes were insecure under a considerably strong … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(25 citation statements)
references
References 30 publications
0
25
0
Order By: Relevance
“…The framework of RCLS scheme is identical to that of the RCLS schemes in [14,15]. In an RCLS scheme, there are three roles, namely, a key generation center (KGC), signers and verifiers.…”
Section: Syntax and Security Model Of Rclsmentioning
confidence: 99%
See 2 more Smart Citations
“…The framework of RCLS scheme is identical to that of the RCLS schemes in [14,15]. In an RCLS scheme, there are three roles, namely, a key generation center (KGC), signers and verifiers.…”
Section: Syntax and Security Model Of Rclsmentioning
confidence: 99%
“…By the security model of RCLS schemes in [14,15], adversaries have three types that are presented as follows.…”
Section: Definition 8 An Rcls Scheme Contains Eight Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, Tsai and Tseng (2015) and Shen et al (2013), independently, proposed a revocable certificateless public-key encryption (RCL-PKE) scheme based on Tseng and Tsai's revocable ID-based encryption with public channels (Tseng and Tsai, 2012). Tsai et al (2014aTsai et al ( , 2014b further proposed a revocable hierarchical ID-based encryption scheme. Afterwards, Sun et al (2014) and Tsai et al (2014aTsai et al ( , 2014b, respectively, proposed a revocable certificateless signature (RCLS) scheme in the random oracle model and in the standard model.…”
Section: Contributionsmentioning
confidence: 99%
“…Tsai et al (2014aTsai et al ( , 2014b further proposed a revocable hierarchical ID-based encryption scheme. Afterwards, Sun et al (2014) and Tsai et al (2014aTsai et al ( , 2014b, respectively, proposed a revocable certificateless signature (RCLS) scheme in the random oracle model and in the standard model. However, the signature sizes of all the RCLS schemes are more than one group element.…”
Section: Contributionsmentioning
confidence: 99%