Efficient Pairing-Free Provably Secure Scalable Revocable Identity-Based Signature Scheme

被引:2
|
作者
Wang, Chang-Ji [1 ]
Huang, Hui [2 ]
Yuan, Yuan [3 ]
机构
[1] Guangdong Univ Foreign Studies, Sch Informat Sci & Technol, Guangzhou, Peoples R China
[2] Guangdong Univ Finance & Econ, Sch Stat & Math, Guangzhou, Peoples R China
[3] Guangdong Univ Foreign Studies, Sch Stat & Math, Guangzhou, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2020年 / 21卷 / 02期
关键词
Revocable identity-based signature; KUNode algorithm; Random oracle model;
D O I
10.3966/160792642020032102018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Revocation functionality is essential for the practical deployment of identity-based cryptosystems because a user's private key may be corrupted by hacking or the period of a contract expires. Many researchers are focusing on revocable identity-based encryption scheme, while revocable identity-based signature scheme has received limited concentration. Recently, several revocable identity-based signature schemes have been proposed. However, these schemes are not scalable and are vulnerable to signing key exposure attack. In this paper, we first refine the security model of revocable identity-based signature scheme by considering the signing key exposure attack. Then, we propose a pairing free revocable identity-based signature scheme with signing key exposure resistance. The proposed scheme is more efficient and practical than existing schemes in terms of update cost, sign cost, verification cost and scalability. Finally, we prove the proposed scheme is existentially unforgeable against adaptively chosen message and identity attacks under the standard discrete logarithm assumption in the random oracle model.
引用
收藏
页码:503 / 509
页数:7
相关论文
共 50 条
  • [31] Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9
    Lai, Jianchang
    Huang, Xinyi
    He, Debiao
    Wu, Wei
    COMPUTER JOURNAL, 2022, 65 (07): : 1692 - 1701
  • [32] Pairing Free Identity-Based Blind Signature Scheme with Message Recovery
    James, Salome
    Gayathri, N. B.
    Reddy, P. Vasudeva
    CRYPTOGRAPHY, 2018, 2 (04) : 1 - 14
  • [33] Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices
    Xie, Congge
    Weng, Jian
    Wen, Jinming
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [34] An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Jiang, Shengyi
    Wu, Jiayuan
    SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 506 - 515
  • [35] Efficient and identity-based signcryption with provably-secure
    Wen Y.
    Ma J.
    Moon S.
    International Journal of Digital Content Technology and its Applications, 2010, 4 (07) : 148 - 153
  • [36] Efficient Pairing-Free Certificateless Signature Scheme for Secure Communication in Resource-Constrained Devices
    Thumbur, Gowri
    Rao, G. Srinivasa
    Reddy, P. Vasudeva
    Gayathri, N. B.
    Reddy, D. V. Rama Koti
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (08) : 1641 - 1645
  • [37] A provably secure identity-based proxy ring signature based on RSA
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1223 - 1236
  • [38] An Efficient Identity-based Forward Secure Signature Scheme from Lattices
    Wu, Guang
    Huang, Ruwei
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 626 - 631
  • [39] AN EFFICIENT AND SECURE IDENTITY-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
    Yoon, Eun-Jun
    INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (04): : 323 - 329
  • [40] Scalable revocable identity-based signature over lattices in the standard model
    Xie, Congge
    Weng, Jian
    Weng, Jiasi
    Hou, Lin
    INFORMATION SCIENCES, 2020, 518 : 29 - 38