Efficient ID-Based Signature Scheme from Bilinear Map

被引:0
|
作者
Sahu, Rajeev Anand [1 ]
Padhye, Sahadeo [1 ]
机构
[1] Motilal Nehru Natl Inst Technol, Dept Math, Allahabad, Uttar Pradesh, India
关键词
ID-based signature scheme; Bilinear map; Computational efficiency; IDENTITY-BASED SIGNATURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an identity (ID)-based signature scheme from bilinear map. The scheme is proved secure against existential forgery on adaptively chosen message and given ID attack in random oracle model under the Computational Diffie-Hellman (CDH) assumption. The new scheme is simple and computationally more efficient than other existing schemes. Furthermore, since the building blocks for proposed ID-based signature is the BLS short signature, hence in communications of ID-based signatures over low band width channels, the proposed scheme will be more economic and applicable.
引用
收藏
页码:301 / 306
页数:6
相关论文
共 50 条
  • [1] A novel ID-based signature scheme from bilinear pairings
    Chen, XF
    Zhang, FG
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 551 - 555
  • [2] ID-based chameleon signature scheme from bilinear pairing
    Du, X.-J. (dxjwy2002@hotmail.com), 2005, South China University of Technology (33):
  • [3] ID-based authenticated blind signature scheme from bilinear pairings
    Zhao, Zemao
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 725 - 728
  • [4] ID-based directed proxy signature scheme from bilinear pairings
    Reddy, P. Vasudeva
    Rao, B. Umaprasada
    Gowri, T.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (05): : 487 - 500
  • [5] New ID-based threshold signature scheme from bilinear pairings
    Chen, XF
    Zhang, FG
    Konidala, DM
    Kim, K
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 371 - 383
  • [6] Efficient ID-based blind signature and proxy signature from bilinear pairings
    Zhang, FG
    Kim, K
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 312 - 323
  • [7] Efficient ID-based proxy chameleon signature from bilinear pairings
    Zhang, Miaomiao
    Chen, Gongliang
    Li, Jianhua
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 135 - +
  • [8] An efficient hierarchical ID-Based signature scheme
    Yu, J
    Li, DX
    Hao, R
    Proceedings of the 11th Joint International Computer Conference, 2005, : 92 - 95
  • [9] Efficient ID-based certificateless signature scheme
    Key Laboratory of Computer Network and Information Security, Xidian University, Xi'an 710071, China
    Tongxin Xuebao, 2008, 2 (87-94):
  • [10] ID-Based Forward-Secure Signature Scheme from the Bilinear Pairings
    Liu, Yali
    Yin, Xinchun
    Qiu, Liang
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 179 - 183