Identity-Based Secret Signature Scheme

被引:0
|
作者
Lee, Byoungcheon [1 ]
Li, Jin [2 ]
Kim, Kwangjo [3 ]
机构
[1] Joongbu Univ, Dept Informat Secur, Chungnam, South Korea
[2] IIT, Dept ECE, Chicago, IL 60616 USA
[3] Korea Adv Inst Sci & Technol, Sch Engn, Daejeon, South Korea
来源
ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2 | 2009年
关键词
Secret signature; Signature privacy; Unforgeability; Invisibility; Receiver designation; Identity-based cryptography; LIMITED VERIFIER SIGNATURE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secret signature, proposed by Lee et al. [11], is a new signature scheme which provides signature privacy and public provability together. Using the secret signature scheme a signer can send his signature secretly to a specific receiver such that only the designated receiver can verify the signature. If any argument occurs between them, the validity of the secret signature can be proven publicly either by the signer or the receiver. Thus it can be used as an important cryptographic primitive to implement private business transactions. In this paper we present an identity-based implementation of secret signature scheme which can enjoy the advantage of reducing key management load compared with the traditional certificate-based cryptography. We modify Cha-Cheon's ID-based signature scheme [3] and ID-based key agreement scheme [14] to provide public provability, and then combine them to implement ID-based secret signature (IBSS) scheme.
引用
收藏
页码:1080 / +
页数:2
相关论文
共 50 条
  • [1] Identity-based puncturable signature scheme
    Yang D.
    Chen Y.
    Wei J.
    Hu X.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (12): : 17 - 26
  • [2] A Practical Identity-Based Signature Scheme
    LI Chenghua1
    2. Department of Mechanical and Aerospace Engineering
    WuhanUniversityJournalofNaturalSciences, 2008, (06) : 692 - 696
  • [3] Biometric identity-based signature scheme
    Hou, Hongxia
    Wang, Shangping
    Ma, Xiaojing
    Dai, Rendong
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (15): : 149 - 151
  • [4] On the security of an identity-based signature scheme
    Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):
  • [5] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [6] Identity-based authenticated blind signature scheme
    Department of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 20009, China
    不详
    Jisuanji Gongcheng, 2006, 14 (136-137):
  • [7] Identity-Based Linkable Ring Signature Scheme
    Deng, Lunzhi
    Jiang, Yuhong
    Ning, Bingqin
    IEEE ACCESS, 2019, 7 : 153969 - 153976
  • [8] A new identity-based group signature scheme
    Cheng, Xiangguo
    Guo, Lifeng
    Yu, Jia
    Ma, Huiran
    Wu, Yuexiu
    International Journal of Computers and Applications, 2013, 35 (01) : 1 - 5
  • [9] RKA Security for Identity-Based Signature Scheme
    Chang, Jinyong
    Wang, Huiqun
    Wang, Fei
    Zhang, Anling
    Ji, Yanyan
    IEEE ACCESS, 2020, 8 : 17833 - 17841
  • [10] An identity-based signature scheme for mobile business
    Wang, Maocai
    Hu, Hanping
    Dai, Guangming
    ICIC Express Letters, 2010, 4 (02): : 565 - 569