ID-based signature scheme without trusted PKG

被引:0
作者
Liao, J [1 ]
Xiao, JF [1 ]
Qi, YH [1 ]
Huang, PW [1 ]
Rong, MT [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200030, Peoples R China
来源
INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS | 2005年 / 3822卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest PKG can forge the signature of any user. On the other hand, the user can deny the signature actually signed by him/herself. To avoid the key escrow problem, we present an ID-based signature scheme without trusted Private Key Generator (PKG). We also presented the exact proof of security to demonstrate that our scheme is secure against existential forgery on adaptively chosen messages and ID attacks assuming the complexity of Computational Diffie-Hellman (CDH) problem. Compared with other signature schemes, the proposed scheme is more efficient.
引用
收藏
页码:53 / 62
页数:10
相关论文
共 13 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [2] Secret handshakes from pairing-based key agreements
    Balfanz, D
    Durfee, G
    Shankar, N
    Smetters, D
    Staddon, J
    Wong, HC
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 180 - 196
  • [3] Bellare M, 2004, LECT NOTES COMPUT SC, V3027, P268
  • [4] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
  • [5] Boneh D., 2001, LNCS, P514, DOI [DOI 10.1007/3-540-45682-1_30, DOI 10.1007/3-540-45682-130]
  • [6] Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18
  • [7] CHEN X, P WISA 03 JEJ ISL KO, P585
  • [8] Gentry C, 2003, LECT NOTES COMPUT SC, V2656, P272
  • [9] Efficient identity based signature schemes based on pairings
    Hess, F
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 310 - 324
  • [10] Libert B., EXACT SECURITY IDENT