{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T02:30:53Z","timestamp":1770690653453,"version":"3.49.0"},"reference-count":32,"publisher":"Oxford University Press (OUP)","issue":"12","license":[{"start":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T00:00:00Z","timestamp":1632096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,30]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Certificateless public key cryptography (CL-PKC) overcomes the difficulties of the certificate managements in traditional public key infrastructure (PKI) and the key escrow problem in ID-Based public key cryptography (ID-PKC), concurrently. In 2018, Tseng et al. proposed a certificateless signature (CLS) scheme and claimed that their proposal is the first scheme which satisfies the security against the level-3 KGC (according to Girault\u2019s three categorizations of the honesty level of a trusted third party (TTP) which is proposed in 1991), in the standard model. However, we will show that unfortunately their scheme is even vulnerable against a malicious KGC. Afterwards, we will improve their scheme to be robust against the proposed attack. Finally, we will propose a CLS scheme secure against the level-3 KGC in the standard model, based on Yuan and Wang\u2019s CLS scheme. We will show that our proposal not only satisfies the level-3 security as well as the basic security requirements of a CLS scheme in the standard model, but also is more efficient than the previous works in the sense of computation and communication costs.<\/jats:p>","DOI":"10.1093\/comjnl\/bxab125","type":"journal-article","created":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T19:11:12Z","timestamp":1628709072000},"page":"3049-3061","source":"Crossref","is-referenced-by-count":2,"title":["On Random-Oracle-Free Top-Level Secure Certificateless Signature Schemes"],"prefix":"10.1093","volume":"65","author":[{"given":"Parvin","family":"Rastegari","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering Group , Golpayegan College of Engineering, Isfahan University of Technology, Golpayegan, 87717-67498, Iran"}]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[{"name":"Institute of Cybersecurity and Cryptology , School of Computing and Information Technology University of Wollongong, Wollongong NSW 2522, Australia"}]}],"member":"286","published-online":{"date-parts":[[2021,9,20]]},"reference":[{"key":"2023010312515163200_ref1","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","volume-title":"Workshop on the theory and application of cryptographic techniques, August 19","author":"Shamir","year":"1984"},{"key":"2023010312515163200_ref2","first-page":"452","article-title":"Certificateless public key cryptography","volume-title":"International conference on the theory and application of cryptology and information security, November 30","author":"Al-Riyami","year":"2003"},{"key":"2023010312515163200_ref3","first-page":"293","article-title":"Certificateless public-key signature: security model and efficient construction","volume-title":"International Conference on Applied Cryptography and Network Security, June 6","author":"Zhang","year":"2006"},{"key":"2023010312515163200_ref4","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1145\/1229285.1266994","article-title":"Self-generated-certificate public key cryptography and certificateless signature\/encryption scheme in the standard model","volume-title":"Proceedings of the 2nd ACM symposium on Information, computer and communications security, March 20","author":"Liu","year":"2007"},{"key":"2023010312515163200_ref5","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1007\/978-3-540-73458-1_23","article-title":"Certificateless signature revisited","volume-title":"Australasian Conference on Information Security and Privacy, July 2","author":"Huang","year":"2007"},{"key":"2023010312515163200_ref6","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/978-3-540-89641-8_5","article-title":"Efficient and short certificateless signature","volume-title":"International Conference on Cryptology and Network Security Springer, December 2","author":"Tso","year":"2008"},{"issue":"1-2","key":"2023010312515163200_ref7","first-page":"193","article-title":"An improved certificateless signature scheme secure in the standard model","volume":"88","author":"Xiong","year":"2008","journal-title":"Fundamenta Informaticae"},{"key":"2023010312515163200_ref8","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/978-3-540-85886-7_20","article-title":"Certificate-based signature schemes without pairings or random oracles","volume-title":"International Conference on Information Security, September 15","author":"Liu","year":"2008"},{"issue":"2","key":"2023010312515163200_ref9","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1016\/j.csi.2008.05.013","article-title":"Efficient and provably-secure certificateless short signature scheme from bilinear pairings","volume":"31","author":"Du","year":"2009","journal-title":"Computer Standards & Interfaces"},{"key":"2023010312515163200_ref10","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-642-02617-1_4","article-title":"Certificateless signature scheme without random oracles","volume-title":"International Conference on Information Security and Assurance, June 25","author":"Yuan","year":"2009"},{"key":"2023010312515163200_ref11","first-page":"1606","article-title":"Key replacement attack on two certificateless signature schemes without random oracles","volume-title":"Key Engineering Materials","author":"Xia","year":"2010"},{"issue":"3","key":"2023010312515163200_ref12","first-page":"969","article-title":"Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings","volume":"27","author":"Fan","year":"2011","journal-title":"J. Inf. Sci. Eng."},{"issue":"2","key":"2023010312515163200_ref13","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1049\/iet-ifs.2011.0004","article-title":"Improved certificateless signature scheme provably secure in the standard model","volume":"6","author":"Yu","year":"2012","journal-title":"IET Information Security"},{"issue":"April 2014","key":"2023010312515163200_ref14","article-title":"Strongly secure certificateless signature scheme supporting batch verification","author":"Fan","year":"2014","journal-title":"Mathematical Problems in Engineering"},{"issue":"9","key":"2023010312515163200_ref15","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1016\/j.ipl.2014.04.004","article-title":"Certificateless signature scheme with security enhanced in the standard model","volume":"114","author":"Yuan","year":"2014","journal-title":"Information Processing Letters"},{"issue":"November 19","key":"2023010312515163200_ref16","article-title":"Secure certificateless signature with revocation in the standard model","author":"Tsai","year":"2014","journal-title":"Mathematical Problems in Engineering"},{"issue":"1","key":"2023010312515163200_ref17","first-page":"297","article-title":"Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes","volume":"31","author":"Chen","year":"2015","journal-title":"J. Inf. Sci. Eng."},{"issue":"November 2017","key":"2023010312515163200_ref18","article-title":"Strongly unforgeable certificateless signature resisting attacks from malicious-but-passive KGC","author":"Yang","year":"2017","journal-title":"Security and Communication Networks"},{"issue":"4","key":"2023010312515163200_ref19","article-title":"Strongly Secure Certificateless Signature Scheme in the Standard Model With Resisting Malicious-But-Passive KGC Attack Ability","volume":"33","author":"Wang","year":"2017","journal-title":"Journal of Information Science & Engineering"},{"issue":"5","key":"2023010312515163200_ref20","doi-asserted-by":"crossref","DOI":"10.1002\/dac.3041","article-title":"Efficient and secure certificateless signature scheme in the standard model","volume":"30","author":"Pang","year":"2017","journal-title":"International Journal of Communication Systems"},{"issue":"1","key":"2023010312515163200_ref21","article-title":"An Efficient Certificateless Signcryption Scheme in the Standard Model","volume":"9","author":"Rastegari","year":"2017","journal-title":"ISeCure"},{"key":"2023010312515163200_ref22","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1016\/j.ins.2018.03.053","article-title":"A pairing-free and provably secure certificateless signature scheme","volume":"450","author":"Karati","year":"2018","journal-title":"Information Sciences"},{"issue":"5","key":"2023010312515163200_ref23","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1007\/s10207-019-00430-5","article-title":"Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model","volume":"18","author":"Rastegari","year":"2019","journal-title":"International Journal of Information Security"},{"issue":"2","key":"2023010312515163200_ref24","doi-asserted-by":"crossref","first-page":"1421","DOI":"10.1109\/JSYST.2018.2844809","article-title":"A new certificateless signature scheme provably secure in the standard model","volume":"13","author":"Shim","year":"2018","journal-title":"IEEE Systems Journal"},{"issue":"3","key":"2023010312515163200_ref25","doi-asserted-by":"crossref","first-page":"2763","DOI":"10.1109\/JSYST.2018.2889780","article-title":"Top-level secure certificateless signature scheme in the standard model","volume":"13","author":"Tseng","year":"2019","journal-title":"IEEE Systems Journal"},{"key":"2023010312515163200_ref26","doi-asserted-by":"crossref","first-page":"112870","DOI":"10.1109\/ACCESS.2019.2935252","article-title":"Top-Level Secure Certificateless Signature Against Malicious-But-Passive KGC","volume":"7","author":"Yang","year":"2019","journal-title":"IEEE Access"},{"issue":"8","key":"2023010312515163200_ref27","doi-asserted-by":"crossref","first-page":"1178","DOI":"10.1093\/comjnl\/bxz041","article-title":"Efficient Certificateless Signcryption in the standard model: Revisiting Luo and Wan\u2019s scheme from wireless personal communications (2018)","volume":"62","author":"Rastegari","year":"2019","journal-title":"The Computer Journal"},{"key":"2023010312515163200_ref28","doi-asserted-by":"crossref","first-page":"102074","DOI":"10.1016\/j.adhoc.2020.102074","article-title":"A new provably secure certificateless signature scheme for Internet of Things","volume":"100","author":"Du","year":"2020","journal-title":"Ad Hoc Networks"},{"key":"2023010312515163200_ref29","doi-asserted-by":"crossref","first-page":"102655","DOI":"10.1016\/j.jisa.2020.102655","article-title":"A certificateless signature for multi-source network coding","volume":"55","author":"Yu","year":"2020","journal-title":"Journal of Information Security and Applications"},{"key":"2023010312515163200_ref30","first-page":"490","article-title":"Self-certified public keys","volume-title":"Workshop on the Theory and Application of of Cryptographic Techniques, April 8","author":"Girault","year":"1991"},{"key":"2023010312515163200_ref31","doi-asserted-by":"crossref","first-page":"68804","DOI":"10.1109\/ACCESS.2018.2879961","article-title":"Security analysis of various authentication schemes based on three types of digital signature schemes","volume":"6","author":"Shim","year":"2018","journal-title":"IEEE Access"},{"key":"2023010312515163200_ref32","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","volume-title":"Annual international cryptology conference, August 19","author":"Boneh","year":"2001"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/65\/12\/3049\/48480738\/bxab125.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/65\/12\/3049\/48480738\/bxab125.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T12:52:15Z","timestamp":1672750335000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/65\/12\/3049\/6369345"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,20]]},"references-count":32,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2021,9,20]]},"published-print":{"date-parts":[[2022,12,30]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxab125","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2022,12]]},"published":{"date-parts":[[2021,9,20]]}}}