A Tightly Secure Identity-Based Signature Scheme from Isogenies

被引:1
|
作者
Chen, Jiawei [1 ]
Jo, Hyungrok [2 ]
Sato, Shingo [2 ]
Shikata, Junji [1 ,2 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa, Japan
[2] Yokohama Natl Univ, Inst Adv Sci, Yokohama, Kanagawa, Japan
来源
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023 | 2023年 / 14154卷
关键词
Identity-based signature; Isogeny-based cryptography; Post-quantum cryptography; GENERIC CONSTRUCTION;
D O I
10.1007/978-3-031-40003-2_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a tightly secure identity-based signature (IBS) scheme based on the supersingular isogeny problems. Although Shaw and Dutta proposed an isogeny-based IBS scheme with provable security, the security reduction is non-tight. For an IBS scheme with concrete security, the tightness of its security reduction affects the key size and signature size. Hence, it is reasonable to focus on a tight security proof for an isogeny-based IBS scheme. In this paper, we propose an isogeny-based IBS scheme based on the lossy CSI-FiSh signature scheme and give a tight security reduction for this scheme. While the existing isogeny-based IBS has the square-root advantage loss in the security proof, the security proof for our IBS scheme avoids such advantage loss, due to the properties of lossy CSI-FiSh. Moreover, we show that the user key size and signature size of our scheme are better than those sizes of existing isogeny-based IBS schemes, under suitable parameter settings.
引用
收藏
页码:141 / 163
页数:23
相关论文
共 50 条
  • [1] Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies
    Shaw, Surbhi
    Dutta, Ratna
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 309 - 326
  • [2] CsiIBS: A post-quantum identity-based signature scheme based on isogenies
    Peng, Cong
    Chen, Jianhua
    Zhou, Lu
    Choo, Kim-Kwang Raymond
    He, Debiao
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [3] On the General Construction of Tightly Secure Identity-Based Signature Schemes
    Wu, Ge
    Zhao, Zhen
    Guo, Fuchun
    Susilo, Willy
    Zhang, Futai
    COMPUTER JOURNAL, 2020, 63 (12) : 1835 - 1848
  • [4] Cryptanalysis of a secure and efficient identity-based signature scheme
    Yu, Yong
    Ni, Jian-Bing
    Xu, Chun-Xiang
    Niu, Lei
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (05): : 1125 - 1131
  • [5] Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model
    Foo, Ernest
    Li, Qinyi
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 381 - 402
  • [6] Identity-Based Threshold Signatures from Isogenies
    Atapoor, Shahla
    CRYPTOGRAPHY AND CODING, IMACC 2023, 2024, 14421 : 220 - 240
  • [7] AN EFFICIENT AND SECURE IDENTITY-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
    Yoon, Eun-Jun
    INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (04): : 323 - 329
  • [8] Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios
    Krzywiecki, Lukasz
    Slowik, Marta
    Szala, Michal
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 310 - 324
  • [9] Lightweight and Secure IoT-Based Payment Protocols from an Identity-Based Signature Scheme
    Wahaballa, Abubaker
    ELECTRONICS, 2022, 11 (21)
  • [10] An efficient and provably secure identity-based signature scheme in the standard model
    Li, Ji-Guo
    Jiang, Ping-Jin
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (11): : 2130 - 2136