Identity-based puncturable signature scheme

被引:0
作者
Yang D. [1 ]
Chen Y. [1 ]
Wei J. [1 ]
Hu X. [1 ]
机构
[1] School of Data and Target Engineering, Information Engineering University, Zhengzhou
来源
Tongxin Xuebao/Journal on Communications | 2021年 / 42卷 / 12期
基金
中国国家自然科学基金;
关键词
Bloom filter; Identity-based signature; Key exposure; Puncturable signature;
D O I
10.11959/j.issn.1000-436x.2021223
中图分类号
学科分类号
摘要
To overcome the shortcomings of available forward-secure identity-based signature (IBS) scheme in terms of actual practicability and secret key update efficiency, the notion of identity-based puncturable signature (IBPS) scheme was proposed based on the idea of puncturable public-key encryption scheme. Specifically, the syntax and security notion of IBPS were given, and then a concrete IBPS scheme was constructed based on Bloom filter. Under the computational Diffie-Hellman assumption, the proposed scheme achieved the existential unforgeability in the random oracle model. The performance analysis and implementation results demonstrate that, compared with traditional forward-secure IBS schemes, the proposed scheme provides more practical fine-grained forward secrecy, and has higher efficiency of secret key update. © 2021, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:17 / 26
页数:9
相关论文
共 28 条
[1]  
SHAMIR A., Identity-based cryptosystems and signature schemes, Advances in Cryptology, pp. 47-53, (1984)
[2]  
CHA J C., An identity-based signature from gap Diffie-Hellman groups, Public Key Cryptography - PKC 2003, pp. 18-30, (2003)
[3]  
PATERSON K G, SCHULDT J C N., Efficient identity-based signatures secure in the standard model, Information Security and Privacy, pp. 207-222, (2006)
[4]  
YANG X D, YANG M M, GAO G J, Et al., ID-based server-aided verification signature scheme with strong unforgeability, Journal on Communications, 37, 6, pp. 49-55, (2016)
[5]  
LIU X Y, LIU S L, GU D W., Tightly secure identity-based signature scheme, Journal of Cryptologic Research, 8, 1, pp. 132-141, (2021)
[6]  
TIAN M M, CHEN J, ZHONG H., Identity-based incremental signature scheme from lattices, Journal on Communications, 42, 1, pp. 108-117, (2021)
[7]  
HOU H X, ZHANG M R, ZHAO Y Q, Et al., ID-based ring signature on prime order group from asymmetric pairing, Journal on Communications, 42, 9, pp. 155-164, (2021)
[8]  
ANDERSON R., Two remarks on public key cryptology, Invited Lecture at the 4th ACM Conference on Computer and Communications Security, pp. 1-5, (1997)
[9]  
BELLARE M, MINER S K., A forward-secure digital signature scheme, Advances in Cryptology - CRYPTO' 99, pp. 431-448, (1999)
[10]  
ITKIS G, REYZIN L., Forward-secure signatures with optimal signing and verifying, Advances in Cryptology - CRYPTO 2001, pp. 332-354, (2001)