Stateless forward-secure key-insulated linkable ring signature scheme in ID-based setting

被引:7
|
作者
Odoom, Justice [1 ]
Huang, Xiaofang [1 ]
Wang, Licheng [2 ]
机构
[1] Southwest Univ Sci & Technol, Sch Comp Sci & Technol, Mianyang 621010, Sichuan, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
Anonymity; Forward-security; Key-insulation; Ring signature; Statelessness;
D O I
10.1016/j.sysarc.2022.102600
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Forward-security and key-insulation have been the mainstream antidotes to the key exposure problem in conventional and ring signatures primarily in the setting of public key infrastructure. However, all extant schemes require keeping state of time periods. Moreover, time-bound keys are stored for retrieval during key update and more importantly signature-related dispute resolution which may extend beyond stipulated time periods. Spurred on by the gravity of key exposure in the setting of identity-based cryptography, we introduce a stateless forward-secure key-insulated linkable ring signature accomplished partly with on-demand ephemeral secret keys consequently eliminating the need for state-keeping and long-term storage. We prove security of our construction in the Random Oracle Model based on intractable problems of Computational Diffie-Hellman (CDH) and Discrete Logarithm (DL). Subsequently, we present evaluation results from a comparative analysis of extant identity-based linkable ring signature schemes to attest to the uniqueness, convenience and efficiency of our scheme which incidentally compared to state-of-the-art achieves a running time of 22.113ms faster at verification phase making it the fastest compared to extant schemes aside the statelessness and constant linkability attributes.
引用
收藏
页数:10
相关论文
共 25 条
  • [21] A novel ID-based threshold ring signature scheme competent for anonymity and anti-forgery
    Chung, Yu Fang
    Wu, Zhen Yu
    Lai, Feipei
    Chen, Tzer Shyong
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 502 - +
  • [22] Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
    Chow, SSM
    Yiu, SM
    Hui, LCK
    Chow, KP
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 352 - 369
  • [23] Efficient Identity-Based Parallel Key-Insulated Signature Scheme using Pairings over Elliptic Curves
    Amarapu, R. B.
    Reddy, P. V.
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2018, 77 (01): : 24 - 28
  • [24] Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision
    Abbasinezhad-Mood, Dariush
    Mazinani, Sayyed Majid
    Nikooghadam, Morteza
    Ostad-Sharif, Arezou
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1227 - 1238
  • [25] Modification of One Forward Secure Ring Signature Scheme Based on Bilinear Groups of Composite Order
    Cao, Zhengjun
    Wu, Xiangjia
    Cao, Hanyue
    2013 INTERNATIONAL CONFERENCE ON CLOUD AND SERVICE COMPUTING (CSC 2013), 2013, : 128 - 133