A Tightly Secure Identity-Based Signature Scheme from Isogenies

被引:1
|
作者
Chen, Jiawei [1 ]
Jo, Hyungrok [2 ]
Sato, Shingo [2 ]
Shikata, Junji [1 ,2 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa, Japan
[2] Yokohama Natl Univ, Inst Adv Sci, Yokohama, Kanagawa, Japan
来源
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023 | 2023年 / 14154卷
关键词
Identity-based signature; Isogeny-based cryptography; Post-quantum cryptography; GENERIC CONSTRUCTION;
D O I
10.1007/978-3-031-40003-2_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a tightly secure identity-based signature (IBS) scheme based on the supersingular isogeny problems. Although Shaw and Dutta proposed an isogeny-based IBS scheme with provable security, the security reduction is non-tight. For an IBS scheme with concrete security, the tightness of its security reduction affects the key size and signature size. Hence, it is reasonable to focus on a tight security proof for an isogeny-based IBS scheme. In this paper, we propose an isogeny-based IBS scheme based on the lossy CSI-FiSh signature scheme and give a tight security reduction for this scheme. While the existing isogeny-based IBS has the square-root advantage loss in the security proof, the security proof for our IBS scheme avoids such advantage loss, due to the properties of lossy CSI-FiSh. Moreover, we show that the user key size and signature size of our scheme are better than those sizes of existing isogeny-based IBS schemes, under suitable parameter settings.
引用
收藏
页码:141 / 163
页数:23
相关论文
共 50 条
  • [41] Forward-secure identity-based signature: Security notions and construction
    Yu, Jia
    Hao, Rong
    Kong, Fanyu
    Cheng, Xiangguo
    Fan, Jianxi
    Chen, Yangkui
    INFORMATION SCIENCES, 2011, 181 (03) : 648 - 660
  • [42] Efficient Identity-Based Signature from Lattices
    Tian, Miaomiao
    Huang, Liusheng
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 321 - 329
  • [43] A Wireless Mesh network Secure Access method based on Identity-based Signature
    Wang, Ze
    Xing, Yajuan
    Wang, Qi
    Liu, Wenju
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [44] Efficient identity-based threshold signature scheme from bilinear pairings in standard model
    Li, Fei
    Gao, Wei
    Wang, Guilin
    Chen, Kefei
    Wang, Xueli
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2014, 8 (2-3) : 107 - 115
  • [45] Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem
    Dutta, Ratna
    Debnath, Sumit Kumar
    Biswas, Chinmoy
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 595 - 602
  • [46] An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System
    Bao, Zijian
    He, Debiao
    Peng, Cong
    Luo, Min
    Choo, Kim-Kwang Raymond
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2023, 4 : 231 - 242
  • [47] Efficient identity-based public-key quantum signature scheme
    Xin, Xiangjun
    Wang, Zhuo
    Yang, Qinglan
    Li, Fagen
    INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2020, 34 (10):
  • [48] Identity-based key-insulated signature with secure key-updates
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Li, Xiangxue
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 13 - +
  • [49] Revocable and strongly unforgeable identity-based signature scheme in the standard model
    Liu, Zhenhua
    Zhang, Xiangsong
    Hu, Yupu
    Takagi, Tsuyoshi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2422 - 2433
  • [50] An Efficient Fuzzy Identity-based Signature Scheme without Bilinear Pairings
    Wang, Changji
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 440 - 444