{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T22:51:29Z","timestamp":1776811889738,"version":"3.51.2"},"reference-count":19,"publisher":"European Society of Computational Methods in Sciences and Engineering","issue":"3","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computational Methods in Sciences and Engineering"],"published-print":{"date-parts":[[2018,8]]},"abstract":"<jats:p>Certificateless public key cryptography (CL-PKC) was introduced to solve two important problems in public key cryptography. One was the presence of certificates in traditional public-key cryptography (TPKC), the other was the key escrow problem in ID-based public-key cryptography (ID-PKC). In recent years, several certificateless signature schemes (CLS) have been proposed in the random oracle model (ROM) and the standard model. However, many implementations of the random oracle may result in insecure schemes. Some CLS schemes in the standard model were insecure against key replacement attack and were not strongly unforgeable. In order to solve these problems, we construct a CLS scheme in the ROM in this paper. Based on the Computational Diffie-Hellman (CDH) assumption and collision-resistant hash (CRH) assumption and partially depending on the ROM, we prove that the scheme has strong unforgeability. In addition, we show that the proposed scheme enjoys higher computational efficiency.<\/jats:p>","DOI":"10.3233\/jcm-180823","type":"journal-article","created":{"date-parts":[[2018,5,22]],"date-time":"2018-05-22T10:56:24Z","timestamp":1526986584000},"page":"715-724","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["A certificateless signature scheme with strong unforgeability in the random oracle model"],"prefix":"10.66113","volume":"18","author":[{"given":"Xia","family":"Yang","sequence":"first","affiliation":[{"name":"Fuyang Normal University","place":["China"]}]},{"given":"Xing-Ping","family":"Sheng","sequence":"additional","affiliation":[{"name":"Fuyang Normal University","place":["China"]}]},{"given":"Mian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fuyang Normal University","place":["China"]}]}],"member":"55691","published-online":{"date-parts":[[2018,8]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"452","article-title":"Certificateless public key cryptography","author":"Al-Riymi S.S.","year":"2003","unstructured":"Al-RiymiS.S. and PatersonK.G., Certificateless public key cryptography, in: Proceedings of the Asiacypt\u20192003, 2003, pp. 452\u2013473.","journal-title":"Proceedings of the Asiacypt\u20192003"},{"key":"e_1_3_2_3_2","first-page":"13","article-title":"On the security of certificateless signature schemes from Asiacypt 2003","author":"Huang X.Y.","year":"2005","unstructured":"HuangX.Y. SusiloW. MuY. et al., On the security of certificateless signature schemes from Asiacypt 2003, in: Proceedings of the CANS\u20192005, 2005, pp. 13\u201345.","journal-title":"Proceedings of the CANS\u20192005"},{"key":"e_1_3_2_4_2","first-page":"235","article-title":"Key replacement attack against a generic construction of certificateless signature","author":"Hu B.C.","year":"2006","unstructured":"HuB.C. WongD.S. ZhangZ.F. et al., Key replacement attack against a generic construction of certificateless signature, in: Proceedings of the ACISP\u20192006, 2006, pp. 235\u2013246.","journal-title":"Proceedings of the ACISP\u20192006"},{"key":"e_1_3_2_5_2","first-page":"308","article-title":"Certificateless signature revisited","author":"Huang X.Y.","year":"2007","unstructured":"HuangX.Y. MuY. SusiloW. et al., Certificateless signature revisited, in: Proceedings of the ACISP\u20192007, 2007, pp. 308\u2013322.","journal-title":"Proceedings of the ACISP\u20192007"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.08.024"},{"key":"e_1_3_2_7_2","first-page":"64","article-title":"Efficient and short certificateless signature scheme","author":"Tso R.","year":"2008","unstructured":"TsoR. YiX. and HuangX.Y., Efficient and short certificateless signature scheme, in: Proceedings of the CANS\u20192008, 2008, pp. 64\u201379.","journal-title":"Proceedings of the CANS\u20192008"},{"key":"e_1_3_2_8_2","first-page":"93","article-title":"Certificateless signature scheme without bilinear pairing","volume":"33","author":"Wang S.B.","year":"2012","unstructured":"WangS.B. LiuW.H. and XieQ., Certificateless signature scheme without bilinear pairing, Journal on Communications 33 (2012), 93\u201398.","journal-title":"Journal on Communications"},{"key":"e_1_3_2_9_2","first-page":"94","article-title":"Strongly secure certificateless signature scheme without bilinear pairing","volume":"34","author":"Wang Y.F.","year":"2013","unstructured":"WangY.F. and ZhangR.Z., Strongly secure certificateless signature scheme without bilinear pairing, Chinese Journal of Journal on Communications 34 (2013), 94\u201399.","journal-title":"Chinese Journal of Journal on Communications"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_11"},{"key":"e_1_3_2_11_2","first-page":"273","article-title":"Self-generated-certificate public key cryptography and certificateless signature\/encryption scheme in the standard model","author":"Liu J.K.","year":"2007","unstructured":"LiuJ.K. AuM.H. and SusiloW., Self-generated-certificate public key cryptography and certificateless signature\/encryption scheme in the standard model, in: Proceedings of the ASIACCS\u20192007, 2007, pp. 273\u2013283.","journal-title":"Proceedings of the ASIACCS\u20192007"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.3233\/FUN-2008-881-209"},{"key":"e_1_3_2_13_2","first-page":"31","article-title":"Certificateless signature scheme without random oracle","author":"Yuan Y.","year":"2009","unstructured":"YuanY. LiD. TianL. et al., Certificateless signature scheme without random oracle, in: Proceedings of ISA\u20192009, 2009, pp. 31\u201340.","journal-title":"Proceedings of ISA\u20192009"},{"key":"e_1_3_2_14_2","first-page":"439","article-title":"Key replacement attack on two certificateless signature scheme without random oracles","author":"Xia Q.","year":"2012","unstructured":"XiaQ. XuC.X. and YuY., Key replacement attack on two certificateless signature scheme without random oracles, Key Engineering Materials (2012), 439\u2013440.","journal-title":"Key Engineering Materials"},{"key":"e_1_3_2_15_2","first-page":"1","article-title":"Certificateless signature scheme without random oracles","volume":"36","author":"Li Y.Q.","year":"2015","unstructured":"LiY.Q. LiJ.G. and ZhangY.C., Certificateless signature scheme without random oracles, Journal on Communications 36 (2015), 1\u201310.","journal-title":"Journal on Communications"},{"key":"e_1_3_2_16_2","first-page":"153","article-title":"On the security of a certificateless signature scheme in the standard model","author":"Cheng L.","unstructured":"ChengL. WenQ. JinZ.P. et al., On the security of a certificateless signature scheme in the standard model, Cryptology ePrint Archieve, Report 2013, 153.","journal-title":"Cryptology ePrint Archieve, Report 2013"},{"key":"e_1_3_2_17_2","first-page":"935","article-title":"A verifiably encypted signature scheme with strong unforgeability","author":"Zhang J.H.","year":"2007","unstructured":"ZhangJ.H., A verifiably encypted signature scheme with strong unforgeability, in: INFOSCALE2007, 2007, pp. 935\u2013938.","journal-title":"INFOSCALE2007"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2011.0004"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.3233\/JCM-2008-81-206"},{"issue":"1","key":"e_1_3_2_20_2","first-page":"S13","article-title":"A new framework for an efficient ticket booking scheme based on mechanism design","volume":"12","author":"Mukhopadhyay S.","year":"2012","unstructured":"MukhopadhyayS. GhoshD. and DebnathN., A new framework for an efficient ticket booking scheme based on mechanism design, J Comput Methods Sci Eng 12(Suppl 1) (2012), S13\u2013S27.","journal-title":"J Comput Methods Sci Eng"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCM-180823","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JCM-180823","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCM-180823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T22:07:26Z","timestamp":1776809246000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCM-180823"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["10.3233\/JCM-180823"],"URL":"https:\/\/doi.org\/10.3233\/jcm-180823","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8]]}}}