Identity-based signature scheme based on quintic residues

被引:0
作者
Dong, Xue-Dong [1 ]
Gao, Yuan [1 ]
机构
[1] Dalian Univ, Coll Informat Engn, Dalian 116622, Liaoning, Peoples R China
来源
PROCEEDINGS OF THE 2ND ANNUAL INTERNATIONAL CONFERENCE ON ELECTRONICS, ELECTRICAL ENGINEERING AND INFORMATION SCIENCE (EEEIS 2016) | 2016年 / 117卷
关键词
Cryptography; Quintic residue; Identity-based signature; Provable security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a new method to compute a quintic root of a quintic residue. Then we give a new identity-based signature scheme by the method. The scheme is secure against existential forgery on the adaptive chosen message and identity attacks assuming the hardness of factoring. The scheme is the first identity-based signature scheme based on quintic residues.
引用
收藏
页码:836 / 841
页数:6
相关论文
共 9 条
[1]  
[Anonymous], INT J NETWORK SECURI
[2]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[3]   Identity-based signature scheme based on quadratic residues [J].
Chai ZhenChuan ;
Cao ZhenFu ;
Dong XiaoLei .
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03) :373-380
[4]  
Dong XD, 2015, ACSR ADV COMPUT, V39, P1039
[5]   Constructing identity-based cryptosystems for discrete logarithm based cryptosystems [J].
Lee, WB ;
Liao, KC .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2004, 27 (04) :191-199
[6]   Identity oriented signature scheme based on quadratic residues [J].
Qiu, WD ;
Chen, KF .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) :235-242
[7]   An identity-based society oriented signature scheme with anonymous signers [J].
Saeednia, S .
INFORMATION PROCESSING LETTERS, 2002, 83 (06) :295-299
[8]  
Shamir A., 1984, ADV CRYPTOLOGY, P47, DOI 10.1007/3-540-39568-7_5
[9]   Cryptanalysis of "an identity-based society oriented signature scheme with anonymous signers" [J].
Shao, ZH .
INFORMATION PROCESSING LETTERS, 2003, 86 (06) :295-298