A Tightly Secure Identity-Based Signature Scheme from Isogenies

被引:1
|
作者
Chen, Jiawei [1 ]
Jo, Hyungrok [2 ]
Sato, Shingo [2 ]
Shikata, Junji [1 ,2 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa, Japan
[2] Yokohama Natl Univ, Inst Adv Sci, Yokohama, Kanagawa, Japan
来源
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023 | 2023年 / 14154卷
关键词
Identity-based signature; Isogeny-based cryptography; Post-quantum cryptography; GENERIC CONSTRUCTION;
D O I
10.1007/978-3-031-40003-2_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a tightly secure identity-based signature (IBS) scheme based on the supersingular isogeny problems. Although Shaw and Dutta proposed an isogeny-based IBS scheme with provable security, the security reduction is non-tight. For an IBS scheme with concrete security, the tightness of its security reduction affects the key size and signature size. Hence, it is reasonable to focus on a tight security proof for an isogeny-based IBS scheme. In this paper, we propose an isogeny-based IBS scheme based on the lossy CSI-FiSh signature scheme and give a tight security reduction for this scheme. While the existing isogeny-based IBS has the square-root advantage loss in the security proof, the security proof for our IBS scheme avoids such advantage loss, due to the properties of lossy CSI-FiSh. Moreover, we show that the user key size and signature size of our scheme are better than those sizes of existing isogeny-based IBS schemes, under suitable parameter settings.
引用
收藏
页码:141 / 163
页数:23
相关论文
共 50 条
  • [31] Identity-based ring signature scheme based on quadratic residues
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    High Technology Letters, 2009, 15 (01) : 94 - 100
  • [32] Forward-secure identity-based signature with efficient revocation
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (07) : 1390 - 1411
  • [33] Post-quantum secure identity-based signature achieving forward secrecy
    Shaw, Surbhi
    Dutta, Ratna
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 69
  • [34] A generic construction of identity-based proxy signature scheme in the standard model
    Hu X.
    Xu H.
    Wang J.
    Tan W.
    Yang Y.
    International Journal of Information and Computer Security, 2019, 11 (01) : 83 - 100
  • [35] Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks
    Zhang, Yang
    Tang, Yu
    Li, Chaoyang
    Zhang, Hua
    Ahmad, Haseeb
    SENSORS, 2024, 24 (13)
  • [36] Security analysis of an identity-based strongly unforgeable signature scheme
    Lee, Kwangsu
    Lee, Dong Hoon
    INFORMATION SCIENCES, 2014, 286 : 29 - 34
  • [37] Efficient Signature Scheme with Batch Verifications in Identity-Based Framework
    Gopal, P. V. S. S. N.
    Reddy, P. Vasudeva
    Gowri, T.
    ETRI JOURNAL, 2016, 38 (02) : 397 - 404
  • [38] A Schnorr-Like Lightweight Identity-Based Signature Scheme
    Galindo, David
    Garcia, Flavio D.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 135 - +
  • [39] Comment on "An efficient identity-based signature scheme with provable security"
    Tan, Syh-Yuan
    Heng, Swee-Huay
    INFORMATION SCIENCES, 2024, 659
  • [40] A novel identity-based strong designated verifier signature scheme
    Kang, Baoyuan
    Boyd, Colin
    Dawson, Ed
    JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (02) : 270 - 273