Skip to main content

Construction of Lightweight Certificate-Based Signature and Application in Cloud Computing

  • Conference paper
Advances in Wireless Sensor Networks (CWSN 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 418))

Included in the following conference series:

  • 1142 Accesses

Abstract

Certificate-based signature (CBS) scheme preserves advantages of certificate-based encryption, such as implicit certification and no private key escrow problem. In this paper, we propose a new short and efficient CBS scheme in the random oracle model based on the Schnorr signature scheme. The short signature length and efficient computation make it particularly useful in power and bandwidth limited environment. In addition, we present the new application of CBS scheme to the Single Sign-On(SSO) problem in the cloud computing environment, which allows users to sign on only once and have their identities automatically verified by each application or service they want to access. Based on our new CBS scheme construction, the new SSO solution is much more efficient than the one based on proxy signature scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  2. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Gentry, C.: Certificate-based Encryption and the Certificate Revocation Problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Kang, B.G., Park, J.H., Hahn, S.G.: A certificate-based signature scheme. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 99–111. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Certificate-based signature: Security model and efficient construction. In: López, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 110–125. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Liu, J.K., Baek, J., Susilo, W., Zhou, J.: Certificate-Based Signature Schemes without Pairings or Random Oracles. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 285–297. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Au, M.H., Liu, J.K., Susilo, W., Yuen, T.H.: Certificate based (linkable) ring signature. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, vol. 4464, pp. 79–92. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Liu, J., Bao, F., Zhou, J.: Short and Efficient Certificate-Based Signature. Cryptology ePrint Archive, Report 2011/192 (2011), http://eprint.iacr.org/

  9. Mell, P., Grance, T.: Draft NIST working definition of cloud computing (2009), http://csrc.nist.gov/groups/SNS/cloud-computing/index.html (referenced on June 3, 2009)

  10. De Clercq, J.: Single sign-on architectures. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 40–58. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  11. Dodson, B., Sengupta, D., Boneh, D., Lam, M.S.: Secure, consumer-friendly web authentication and payments with a phone. In: Gris, M., Yang, G. (eds.) MobiCASE 2010. LNICST, vol. 76, pp. 17–38. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  12. David, B.M., Tonicelli, R., Nascimento, A., et al.: Secure single sign-on and web authentication. Cryptology ePrint Archive, Report 2011/246, http://eprint.iacr.org/2011/246.pdf

  13. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS 1996, pp. 48–57. ACM, New York (1996)

    Google Scholar 

  14. Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. Journal of Cryptology 25(1), 1–58 (2012)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shaohui, W., Suqin, C. (2014). Construction of Lightweight Certificate-Based Signature and Application in Cloud Computing. In: Sun, L., Ma, H., Hong, F. (eds) Advances in Wireless Sensor Networks. CWSN 2013. Communications in Computer and Information Science, vol 418. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54522-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54522-1_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54521-4

  • Online ISBN: 978-3-642-54522-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics