Identity-Based Secret Signature Scheme

被引:0
作者
Lee, Byoungcheon [1 ]
Li, Jin [2 ]
Kim, Kwangjo [3 ]
机构
[1] Joongbu Univ, Dept Informat Secur, Chungnam, South Korea
[2] IIT, Dept ECE, Chicago, IL 60616 USA
[3] Korea Adv Inst Sci & Technol, Sch Engn, Daejeon, South Korea
来源
ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2 | 2009年
关键词
Secret signature; Signature privacy; Unforgeability; Invisibility; Receiver designation; Identity-based cryptography; LIMITED VERIFIER SIGNATURE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secret signature, proposed by Lee et al. [11], is a new signature scheme which provides signature privacy and public provability together. Using the secret signature scheme a signer can send his signature secretly to a specific receiver such that only the designated receiver can verify the signature. If any argument occurs between them, the validity of the secret signature can be proven publicly either by the signer or the receiver. Thus it can be used as an important cryptographic primitive to implement private business transactions. In this paper we present an identity-based implementation of secret signature scheme which can enjoy the advantage of reducing key management load compared with the traditional certificate-based cryptography. We modify Cha-Cheon's ID-based signature scheme [3] and ID-based key agreement scheme [14] to provide public provability, and then combine them to implement ID-based secret signature (IBSS) scheme.
引用
收藏
页码:1080 / +
页数:2
相关论文
共 50 条
[21]   A new identity-based ring signcryption scheme [J].
Deng, Lunzhi ;
Zeng, Jiwen ;
Li, Siwei .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (04) :333-342
[22]   An Improved Identity-Based Ring Signcryption Scheme [J].
Deng, Lunzhi ;
Liu, Chenglian ;
Wang, Xiangbin .
INFORMATION SECURITY JOURNAL, 2013, 22 (01) :46-54
[23]   A new identity-based ring signcryption scheme [J].
Deng, Lunzhi, 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (06) :333-342
[24]   Security Proofs for Identity-Based Identification and Signature Schemes [J].
Bellare, Mihir ;
Namprempre, Chanathip ;
Neven, Gregory .
JOURNAL OF CRYPTOLOGY, 2009, 22 (01) :1-61
[25]   Efficient Identity-Based Proxy Signature in the Standard Model [J].
Gu, Ke ;
Jia, Weijia ;
Jiang, Chunlin .
COMPUTER JOURNAL, 2015, 58 (04) :792-807
[26]   A New Identity-based Authentication Scheme for SIP [J].
Peng, Shengbo ;
Ruan, Ou ;
Zhou, Jing ;
Chen, Zaixing .
2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, :90-95
[27]   Identity-based strong designated verifier signature revisited [J].
Huang, Qiong ;
Yang, Guomin ;
Wong, Duncan S. ;
Susilo, Willy .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (01) :120-129
[28]   Security Proofs for Identity-Based Identification and Signature Schemes [J].
Mihir Bellare ;
Chanathip Namprempre ;
Gregory Neven .
Journal of Cryptology, 2009, 22 :1-61
[29]   Identity-Based Chameleon Signature Schemes over Lattices [J].
Zhang, Yanhua ;
Chen, Yan ;
Liu, Ximeng ;
Yin, Yifeng ;
Hu, Yupu .
JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2024, 46 (02) :757-764
[30]   An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs [J].
Ali, Ikram ;
Lawrence, Tandoh ;
Li, Fagen .
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 103 (103)