He, D., Chen, J., and Zhang, R. (2012). An Effi-
cient and Provably-Secure Certificateless Signature
Scheme without Bilinear Pairings. International Jour-
nal of Communication Systems, 25(11):1432–1442.
Hu, B. C., Wong, D. S., Zhang, Z., and Deng, X. (2007).
Certificateless Signature: A New Security Model and
an improved Generic Construction. Des. Codes Cryp-
tography, 42(2):109–126.
Huang, X., Mu, Y., Susilo, W., Wong, D. S., and Wu,
W. (2007). Certificateless Signatures Revisited. In
Pieprzyk, J., Ghodosi, H., and Dawson, E., editors,
ACISP, volume 4586 of Lecture Notes in Computer
Science, pages 308–322. Springer.
Huang, X., Mu, Y., Susilo, W., Wong, D. S., and Wu, W.
(2012). Certificateless Signatures: New Schemes and
Security Models. Comput. J., 55(4):457–474.
Huang, X., Susilo, W., Mu, Y., and Zhang, F. (2005). On the
Security of Certificateless Signature Schemes from
Asiacrypt 2003. In Desmedt, Y., Wang, H., Mu, Y.,
and Li, Y., editors, CANS, volume 3810 of Lecture
Notes in Computer Science, pages 13–25. Springer.
Kurosawa, K. and Heng, S.-H. (2004). From Digital Signa-
ture to ID-based Identification/Signature. In Bao, F.,
Deng, R. H., and Zhou, J., editors, Public Key Cryp-
tography, volume 2947 of Lecture Notes in Computer
Science, pages 248–261. Springer.
Kurosawa, K. and Heng, S.-H. (2005). Identity-Based Iden-
tification Without Random Oracles. In Gervasi, O.,
Gavrilova, M. L., Kumar, V., Lagan`a, A., Lee, H. P.,
Mun, Y., Taniar, D., and Tan, C. J. K., editors, ICCSA
(2), volume 3481 of Lecture Notes in Computer Sci-
ence, pages 603–613. Springer.
Shamir, A. (1984). Identity-Based Cryptosystems and Sig-
nature Schemes. In Blakley, G. R. and Chaum, D., ed-
itors, CRYPTO, volume 196 of Lecture Notes in Com-
puter Science, pages 47–53. Springer.
Thorncharoensri, P., Susilo, W., and Mu, Y. (2009).
Identity-based Identification Scheme Secure against
Concurrent-Reset Attacks without Random Oracles.
In Youm, H. Y. and Yung, M., editors, WISA, volume
5932 of Lecture Notes in Computer Science, pages
94–108. Springer.
Tian, M. and Huang, L. (2012). Cryptanalysis of a Certifi-
cateless Signature Scheme without Pairings. Interna-
tional Journal of Communication Systems, pages n/a–
n/a.
Tso, R., Huang, X., and Susilo, W. (2012). Strongly Secure
Certificateless Short Signatures. Journal of Systems
and Software, 85(6):1409–1417.
Tso, R., Yi, X., and Huang, X. (2011). Efficient and
Short Certificateless Signatures Secure Against Re-
alistic Adversaries. The Journal of Supercomputing,
55(2):173–191.
Wu, C., Lin, W., Huang, H., and Chen, Z. (2013). Crypt-
analysis of Some Certificateless Signature Schemes in
the Standard Model. International Journal of Applied
Mathematics and Statistics, 36(6):16–25.
Yang, G., Chen, J., Wong, D. S., Deng, X., and Wang, D.
(2007). A More Natural Way to Construct Identity-
Based Identification schemes. In Katz, J. and Yung,
M., editors, ACNS, volume 4521 of Lecture Notes in
Computer Science, pages 307–322. Springer.
Zhang, F., Li, S., Miao, S., Mu, Y., Susilo, W., and Huang,
X. (2010). Cryptanalysis on Two Certificateless Sig-
nature Schemes. International Journal of Computers
Communications & Control, 5(4):586–591.
Zhang, J. and Mao, J. (2012). An Efficient RSA-Based Cer-
tificateless Signature Scheme. Journal of Systems and
Software, 85(3):638–642.
SECRYPT2013-InternationalConferenceonSecurityandCryptography
378