Efficient Pairing-Free Provably Secure Scalable Revocable Identity-Based Signature Scheme

被引:2
|
作者
Wang, Chang-Ji [1 ]
Huang, Hui [2 ]
Yuan, Yuan [3 ]
机构
[1] Guangdong Univ Foreign Studies, Sch Informat Sci & Technol, Guangzhou, Peoples R China
[2] Guangdong Univ Finance & Econ, Sch Stat & Math, Guangzhou, Peoples R China
[3] Guangdong Univ Foreign Studies, Sch Stat & Math, Guangzhou, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2020年 / 21卷 / 02期
关键词
Revocable identity-based signature; KUNode algorithm; Random oracle model;
D O I
10.3966/160792642020032102018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Revocation functionality is essential for the practical deployment of identity-based cryptosystems because a user's private key may be corrupted by hacking or the period of a contract expires. Many researchers are focusing on revocable identity-based encryption scheme, while revocable identity-based signature scheme has received limited concentration. Recently, several revocable identity-based signature schemes have been proposed. However, these schemes are not scalable and are vulnerable to signing key exposure attack. In this paper, we first refine the security model of revocable identity-based signature scheme by considering the signing key exposure attack. Then, we propose a pairing free revocable identity-based signature scheme with signing key exposure resistance. The proposed scheme is more efficient and practical than existing schemes in terms of update cost, sign cost, verification cost and scalability. Finally, we prove the proposed scheme is existentially unforgeable against adaptively chosen message and identity attacks under the standard discrete logarithm assumption in the random oracle model.
引用
收藏
页码:503 / 509
页数:7
相关论文
共 50 条
  • [21] A secure and efficient identity-based quantum signature scheme
    Liu, Bai
    Zhu, Pengda
    Guo, Kuikui
    AIP ADVANCES, 2024, 14 (06)
  • [22] Cryptanalysis of a secure and efficient identity-based signature scheme
    Yu, Yong
    Ni, Jian-Bing
    Xu, Chun-Xiang
    Niu, Lei
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (05): : 1125 - 1131
  • [23] Efficient Pairing-Free Identity-Based ADS-B Authentication Scheme With Batch Verification
    Thumbur, Gowri
    Gayathri, N. B.
    Reddy, P. Vasudeva
    Rahman, Md. Zia Ur
    Lay-Ekuakille, Aime'
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2019, 55 (05) : 2473 - 2486
  • [24] Secure and Pairing-Free Identity-Based Batch Verification Scheme in Vehicle Ad-Hoc Networks
    Hu, Xiaoming
    Wang, Jian
    Xu, Huajie
    Liu, Yan
    Zhang, Xiaojun
    INTELLIGENT COMPUTING METHODOLOGIES, ICIC 2016, PT III, 2016, 9773 : 11 - 20
  • [25] A New Provably Secure Identity-Based Multi-proxy Signature Scheme
    Chen, Qunshan
    Huang, Zhenjie
    Ding, Yong
    Zhou, Yuping
    Huang, Hui
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 230 - 242
  • [26] A novel and provably secure identity-based blind signature scheme for online transactions
    Kumar, Sunil
    Mittal, Gaurav
    Yadav, Arvind
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2025, 50 (02):
  • [27] Efficient and secure pairing-free certificateless strong key-insulated signature scheme
    Babu, A. Ramesh
    Gayathri, N. B.
    Reddy, P. Vasudeva
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2019, 23 (03) : 155 - 166
  • [28] Provably secure identity-based threshold unsigncryption scheme
    Yang, Bo
    Yu, Yong
    Li, Fagen
    Sun, Ying
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 114 - +
  • [29] An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
    Jin, Zhengping
    Zuo, Huijuan
    Du, Hongzhen
    Wen, Qiaoyan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 189 - 193
  • [30] An efficient pairing-free identity-based authenticated group key agreement protocol
    Tan, Zuowen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (03) : 534 - 545