Identity-Based Secret Signature Scheme

被引:0
作者
Lee, Byoungcheon [1 ]
Li, Jin [2 ]
Kim, Kwangjo [3 ]
机构
[1] Joongbu Univ, Dept Informat Secur, Chungnam, South Korea
[2] IIT, Dept ECE, Chicago, IL 60616 USA
[3] Korea Adv Inst Sci & Technol, Sch Engn, Daejeon, South Korea
来源
ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2 | 2009年
关键词
Secret signature; Signature privacy; Unforgeability; Invisibility; Receiver designation; Identity-based cryptography; LIMITED VERIFIER SIGNATURE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secret signature, proposed by Lee et al. [11], is a new signature scheme which provides signature privacy and public provability together. Using the secret signature scheme a signer can send his signature secretly to a specific receiver such that only the designated receiver can verify the signature. If any argument occurs between them, the validity of the secret signature can be proven publicly either by the signer or the receiver. Thus it can be used as an important cryptographic primitive to implement private business transactions. In this paper we present an identity-based implementation of secret signature scheme which can enjoy the advantage of reducing key management load compared with the traditional certificate-based cryptography. We modify Cha-Cheon's ID-based signature scheme [3] and ID-based key agreement scheme [14] to provide public provability, and then combine them to implement ID-based secret signature (IBSS) scheme.
引用
收藏
页码:1080 / +
页数:2
相关论文
共 50 条
[31]   Security analysis of batch verification on identity-based signature schemes [J].
Chiang, Han-Fei ;
Yen, Sung-Ming ;
Lin, Hsi-Chung .
PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4, 2007, :50-+
[32]   Electronic payment scheme using identity-based cryptography [J].
Nguyen, Son Thanh ;
Rong, Chunming .
PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 :330-+
[33]   On the Security of An Identity-based Single-sign-on Scheme [J].
Zhang, Jianhong ;
Liu, Xue .
ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2010, :117-120
[34]   An Efficient Identity-Based Signcryption Scheme for Multiple Receivers [J].
Selvi, S. Sharmila Deva ;
Vivek, S. Sree ;
Srinivasan, Rahul ;
Rangan, Chandrasekaran Pandu .
ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 :71-+
[35]   A new practical Limited identity-based encryption scheme [J].
Lu, Rongxing ;
Cao, Zhenfu ;
Dong, Xiaolei .
FUNDAMENTA INFORMATICAE, 2007, 80 (04) :461-474
[36]   An identity-based cryptographic scheme for cloud storage applications [J].
Medhioub, Manel ;
Hamdi, Mohamed .
INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2019, 10 (02) :93-104
[37]   Efficient Identity-Based Generalized Ring Signcryption Scheme [J].
Zhou, Caixue ;
Cui, Zongmin ;
Gao, Guangyong .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12) :5553-5571
[38]   Identity-based hybrid signcryption scheme using ECC [J].
Yu, Hui-Fang ;
Yang, Bo .
Ruan Jian Xue Bao/Journal of Software, 2015, 26 (12) :3174-3182
[39]   Two new identity-based threshold ring signature schemes [J].
Deng, Lunzhi ;
Zeng, Jiwen .
THEORETICAL COMPUTER SCIENCE, 2014, 535 :38-45
[40]   An improved efficient identity-based proxy signature in the standard model [J].
Hu, XiaoMing ;
Wang, Jian ;
Xu, HuaJie ;
Yang, YinChun ;
Xu, XiaoLin .
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (01) :22-38