{"title":"一种针对恶意PKG的无证书签名和组签名方案","authors":"Guoyan Zhang, Shaohui Wang","doi":"10.1109/AINA.2008.84","DOIUrl":null,"url":null,"abstract":"Identity-based crypto system has many advantages over PKI-based cryptosystem in key distribution, but key escrow is always an inherent drawback. In order to solve the problem, certificateless public key cryptography was introduced by Al-Riyami and Paterson in [8]. In this paper, we first introduce a certificateless signature scheme secure against both malicious PKG attack and DOD attack without random oracle, which is the first scheme satisfying theses properties in the literature. Based on the certificateless signature scheme, we also present a constant-size group signature scheme against malicious group manager.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"A Certificateless Signature and Group Signature Schemes against Malicious PKG\",\"authors\":\"Guoyan Zhang, Shaohui Wang\",\"doi\":\"10.1109/AINA.2008.84\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Identity-based crypto system has many advantages over PKI-based cryptosystem in key distribution, but key escrow is always an inherent drawback. In order to solve the problem, certificateless public key cryptography was introduced by Al-Riyami and Paterson in [8]. In this paper, we first introduce a certificateless signature scheme secure against both malicious PKG attack and DOD attack without random oracle, which is the first scheme satisfying theses properties in the literature. Based on the certificateless signature scheme, we also present a constant-size group signature scheme against malicious group manager.\",\"PeriodicalId\":328651,\"journal\":{\"name\":\"22nd International Conference on Advanced Information Networking and Applications (aina 2008)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-03-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"22nd International Conference on Advanced Information Networking and Applications (aina 2008)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AINA.2008.84\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINA.2008.84","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Certificateless Signature and Group Signature Schemes against Malicious PKG
Identity-based crypto system has many advantages over PKI-based cryptosystem in key distribution, but key escrow is always an inherent drawback. In order to solve the problem, certificateless public key cryptography was introduced by Al-Riyami and Paterson in [8]. In this paper, we first introduce a certificateless signature scheme secure against both malicious PKG attack and DOD attack without random oracle, which is the first scheme satisfying theses properties in the literature. Based on the certificateless signature scheme, we also present a constant-size group signature scheme against malicious group manager.