An efficient and provably secure identity-based signature scheme in the standard model

被引:1
作者
Li, Ji-Guo [1 ]
Jiang, Ping-Jin [1 ]
机构
[1] College of Computer and Information Engineering, Hohai University
来源
Jisuanji Xuebao/Chinese Journal of Computers | 2009年 / 32卷 / 11期
关键词
Bilinear pairings; CDH-problem; Chosen message attack; Identity-based signature; Standard model;
D O I
10.3724/SP.J.1016.2009.02130
中图分类号
学科分类号
摘要
Compared with the traditional public key cryptosystem, identity-based cryptosystem can simplify the key management procedure from the view point of the efficiency and convenience. Most of identity-based signature schemes are secure in the random oracle model, but for which any implementation of the random oracle results in insecure schemes. For example, when random oracle is instantiated with concrete hash functions, the resulting scheme is nonrandom which may not be secure. This paper proposes an efficient and provably secure identity-based signature scheme. The scheme is existentially unforgeable against adaptive chosen message attacks under the computational Diffie-Hellman assumption in the standard model. Compared with the known identity-based scheme secure in the standard model, the scheme enjoys shorter signature length and less operation.
引用
收藏
页码:2130 / 2136
页数:6
相关论文
共 27 条
[1]  
Shamir A., Identity-based cryptosystems and signature schemes, Proceedings of the CRYPTO'1984, pp. 47-53, (1984)
[2]  
Boneh D., Franklin M., Identity-based encryption from the Weil pairing, Proceedings of the CRYPTO'2001, pp. 213-229, (2001)
[3]  
Sakai R., Ohgishi K., Kasahara M., Cryptosystems based on pairing, Proceedings of the Symposium on Cryptography and Information Security(SCIS'2000), pp. 26-28, (2000)
[4]  
Paterson K.G., ID-based signatures from pairings on elliptic curves, Cryptology ePrint Archive, Report 2002/003, (2002)
[5]  
Chen X., Zhang F., Kim K., A new ID-based group signature scheme from bilinear pairings, Proceedings of the WISA'2003, pp. 585-592, (2003)
[6]  
Hess F., Efficient identity based signature schemes based on pairings, Proceedings of the SAC'2002, pp. 310-324, (2003)
[7]  
Cha J.C., Cheon J.H., An identity-based signature from gap Diffie-Hellman groups, Proceedings of the PKC'2003, pp. 18-30, (2003)
[8]  
Yi X., An identity-based signature scheme from the Weil pairing, IEEE Communications Letters, 7, 2, pp. 76-78, (2003)
[9]  
Yoon H., Cheon J.H., Kim Y., Batch verifications with ID-based signatures, Proceedings of the ICISC'2004, pp. 233-248, (2005)
[10]  
Li J., Zhang F.-G., Wang Y.-M., Two efficient hierarchical identity based signature schemes, Acta Electronic Sinica, 35, 1, pp. 150-152, (2007)