SCIENCE CHINA Information Sciences, Volume 64 , Issue 1 : 112101(2021) https://doi.org/10.1007/s11432-019-2903-2

Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks

More info
  • ReceivedAug 8, 2019
  • AcceptedMay 12, 2020
  • PublishedDec 17, 2020


Unmanned aerial vehicle (UAV) technologies have a promising application prospect. It is necessary to use digital signature schemes to protect the integrity and authentication of messages in the UAV networks. According to the characteristics of UAV networks, digital signature schemes should solve the problems of digital certificate management and key escrow, guarantee the real-time performance of UAV executing commands, and ensure that only the designated verifier can verify the signature. Therefore, we proposed a certificateless designated verifier proxy signature (CLDVPS) scheme which meets the requirements. We proved our signature scheme is existentially unforgeable under an adaptive chosen message attack in the random oracle model and compared the efficiency of our signature scheme with other signature schemes. We implemented these signature schemes in jPBC to obtain the computing time and theoretically analyzed signature length of these signature schemes. The analysis results indicate that our CLDVPS scheme is more efficient than most of other related signature schemes on computation costs and also efficient on communication costs.


This work was supported in part by Key Program of National Natural Science Foundation of China (NSFC) (Grant No. U1405255), in part by Shaanxi Science and Technology Coordination and Innovation Project (Grant No. 2016TZC-G-6-3), in part by Fundamental Research Funds for the Central Universities (Grant No. SA-ZD161504), and in part by National Natural Science Foundation of China (Grant No. 61802195).


[1] Gupta L, Jain R, Vaszkun G. Survey of Important Issues in UAV Communication Networks. IEEE Commun Surv Tutorials, 2016, 18: 1123-1152 CrossRef Google Scholar

[2] Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, 1984. 47--53. Google Scholar

[3] Al-Riyami S S, Paterson K G. Certificateless public key cryptography. Lecture Notes in Computer Science, 2003, 2894: 452-473, doi: 10.1007/978-3-540-40061-5_29. Google Scholar

[4] Huang X Y, Susilo W, Mu Y, et al. On the security of certificateless signature schemes from Asiacrypt 2003. In: Proceedings of International Conference on Cryptology and Network Security, Xiamen, 2005. 13--25. Google Scholar

[5] He D, Chen J, Zhang R. An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int J Commun Syst, 2012, 25: 1432-1442 CrossRef Google Scholar

[6] Wang L, Chen K, Long Y. An efficient pairing-free certificateless signature scheme for resource-limited systems. Sci China Inf Sci, 2017, 60: 119102 CrossRef Google Scholar

[7] Karati A, Hafizul Islam S, Biswas G P. A pairing-free and provably secure certificateless signature scheme. Inf Sci, 2018, 450: 378-391 CrossRef Google Scholar

[8] Yeh K H, Su C, Choo K K R. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things. Sensors, 2017, 17: 1001 CrossRef Google Scholar

[9] Jia X, He D, Liu Q. An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment. Ad Hoc Networks, 2018, 71: 78-87 CrossRef Google Scholar

[10] Deng L, Yang Y, Gao R. Certificateless short signature scheme from pairing in the standard model. Int J Commun Syst, 2018, 31: e3796 CrossRef Google Scholar

[11] Du H, Wen Q Y, Zhang S. A Provably-Secure Outsourced Revocable Certificateless Signature Scheme Without Bilinear Pairings. IEEE Access, 2018, 6: 73846-73855 CrossRef Google Scholar

[12] Karati A, Islam S H, Karuppiah M. Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments. IEEE Trans Ind Inf, 2018, 14: 3701-3711 CrossRef Google Scholar

[13] Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Delhi, 1996. 48--57. Google Scholar

[14] Jakobsson M, Sako K, Impagliazzo R. Designated verifier proofs and their applications. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, 1996. 143--154. Google Scholar

[15] Chen Y C, Liu C L, Horng G, et al. A provably secure certificateless proxy signature scheme. Int J Innov Comput Inf Control, 2011, 7: 5557--5569. Google Scholar

[16] Zhang L, Zhang F, Wu Q. Delegation of signing rights using certificateless proxy signatures. Inf Sci, 2012, 184: 298-309 CrossRef Google Scholar

[17] Zhang L, Wu Q H, Qin B, et al. A generic construction of proxy signatures from certificateless signatures. In: Proceedings of the 27th International Conference on Advanced Information Networking and Applications, Barcelona, 2013. 259--266. Google Scholar

[18] Seo S H, Choi K Y, Hwang J Y. Efficient certificateless proxy signature scheme with provable security. Inf Sci, 2012, 188: 322-337 CrossRef Google Scholar

[19] He D, Chen Y, Chen J. An efficient certificateless proxy signature scheme without pairing. Math Comput Model, 2013, 57: 2510-2518 CrossRef Google Scholar

[20] Padhye S, Tiwari N. ECDLP-based certificateless proxy signature scheme with message recovery. Trans Emerging Tel Tech, 2015, 26: 346-354 CrossRef Google Scholar

[21] Shi W, He D, Gong P. On the Security of a Certificateless Proxy Signature Scheme with Message Recovery. Math Problems Eng, 2013, 2013(9): 1-4 CrossRef Google Scholar

[22] Lu Y, Li J. Provably secure certificateless proxy signature scheme in the standard model. Theor Comput Sci, 2016, 639: 42-59 CrossRef Google Scholar

[23] Huang X Y, Susilo W, Mu Y, et al. Certificateless designated verifier signature schemes. In: Proceedings of the 20th International Conference on Advanced Information Networking and Applications, Vienna, 2006. 15--19. Google Scholar

[24] Chen H, Song R S, Zhang F T, et al. An efficient certificateless short designated verifier signature scheme. In: Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, 2008. Google Scholar

[25] Du H Z, Wen Q Y. Effcient certificateless designated verifier signatures and proxy signatures. Chinese J Electron, 2009, 18: 95--100. Google Scholar

[26] Xiao Z B, Yang B, Li S G. Certificateless strong designated verifier signature scheme. In: Proceedings of the 2nd International Conference on E-Business and Information System Security, Wuhan, 2010. Google Scholar

[27] He D B, Chen J H. An efficient certificateless designated verifier signature scheme. Int Arab J Inf Technol, 2013, 10: 389--396. Google Scholar

[28] Lin H Y. A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure. IEEE Access, 2018, 6: 50765-50775 CrossRef Google Scholar

[29] Huang X, Mu Y, Susilo W. Certificateless Signatures: New Schemes and Security Models. Comput J, 2012, 55: 457-474 CrossRef Google Scholar

[30] Caro A D, Iovino V. jPBC: Java pairing based cryptography. In: Proceedings of IEEE Symposium on Computers and Communications, Kerkyra, 2011. 850--855. Google Scholar