Efficient Hierarchical Identity Based Signature Scheme in the Standard Model

被引:1
作者
REN Yanli GU Dawu School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China [200240 ]
机构
关键词
hierarchical; identity based; standard model;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public key generation and identity authentication to lower-level public key generators. Most hierarchical identity based signature schemes are provably secure in the random oracle model or the weak models without random oracles such as gauntlet-ID model. Currently, there is no hierarchical identity based signature scheme that is fully secure in the standard model, with short public parameters and a tight reduction. In this paper, a hierarchical identity based signature scheme based on the q-SDH problem that is fully secure in the standard model is proposed. The signature size is independent of the level of the hierarchy. Moreover, our scheme has short public parameters, high efficiency and a tight reduction.
引用
收藏
页码:665 / 669
页数:5
相关论文
共 16 条
[1]  
Efficient selective ID secure identity based encryption without random Oracles. D Boneh,X Boyen. Advances in Cryptology—Euroerypt‘ 04 . 2004
[2]  
Identity-Based Encryption from the Weil Pairing. Boneh,D.,Franklin,M. Proceeding of Crypto 2001 . 2001
[3]  
Identity-based cryptosystems and signatureschemes. Shamir A. Proc of CRYPTO 84 . 1984
[4]  
Efficient Hierarchical Identity Based Signature in the Standard Model. Au M,Liu J,Yuen T, et al. http://eprint.iacr.org/2007/068 . 2007
[5]  
Constant-Size Hierarchical Identity Based Signature/Signcryption without Random Oracles. Yuen T,Wei V. http://eprint.iacr.org/2005/412 . 2007
[6]  
Efficient Identity Based Signature Schemes Based on Pairings. Hess F. Proc of the SAC2002 . 2003
[7]  
Aforward secure public keyencryption scheme. Canetti R,,Halevi S,Katz J. Proc.of Eurocrypt‘03 . 2003
[8]  
Toward hierarchical identity-based encryption. Horwitz J,Lynn B. EUROCRYPT 2002 . 2002
[9]  
Hierarchical ID-Based cryptography. C.Gentry,and A.Silverberg. Proceedings of Asiacrypt 2002 . 2002
[10]  
Secure hierarchicalidentity-based signature and its application. CHOW S S M,HUI L C K,YIU S M,et al. Proc of ICICS2004 . 2004