Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography

被引:7
作者
Feng, Qi [1 ,2 ]
He, Debiao [1 ,2 ]
Wang, Huaqun [3 ]
Wang, Ding [4 ]
Huang, Xinyi [5 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210023, Peoples R China
[4] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[5] Fujian Normal Univ, Ctr Appl Math Fujian Prov, Fujian Prov Key Lab Network Secur & Cryptology, Coll Math & Informat, Fuzhou 350117, Peoples R China
基金
中国国家自然科学基金;
关键词
protocols; cryptographic protocols; cryptography; digital signatures; authorisation; telecommunication security; private key cryptography; public key cryptography; multiparty key generation protocol; identity-based signature scheme; IEEE P1363 standard; identity-based cryptography; promising mechanism; lightweight authentication; powerful access control; inherent problems; key escrow; secure channel; effective key issuing protocol; distributed setting; weaker assumptions; trusted party; key distribution; ELLIPTIC-CURVES; ENCRYPTION;
D O I
10.1049/iet-ifs.2020.0096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based cryptography (IBC) is considered as a promising mechanism in the Internet of Things andad-hocnetworks, providing lightweight authentication and powerful access control. However, it suffers from two inherent problems, i.e. key escrow and the requirement of a secure channel, which are not always good properties in many realistic scenarios. Thus, an efficient key issuing protocol in a distributed setting without the assumption of the secure channel is needed. In this study, the authors give special attention to the IBC standardised inIEEE P1363and design a multi-party setup and key issuing protocol for it. Their protocol is proven to be malicious secure by simulation under weaker assumptions. Contrast to prior works that rely on a trusted party for key distribution or the strong assumption of a secure channel, they provide the first practical solution for the distributed architectures.
引用
收藏
页码:724 / 732
页数:9
相关论文
共 31 条
  • [1] Asymmetric Secure Multi-party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
    Liu, Yang
    Feng, Qi
    Peng, Cong
    Luo, Min
    He, Debiao
    EMERGING INFORMATION SECURITY AND APPLICATIONS, EISA 2022, 2022, 1641 : 1 - 20
  • [2] Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
    He, Debiao
    Zhang, Yudi
    Wang, Ding
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) : 1124 - 1132
  • [3] Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme
    Feng, Qi
    He, Debiao
    Liu, Zhe
    Wang, Ding
    Choo, Kim-Kwang Raymond
    IET INFORMATION SECURITY, 2020, 14 (04) : 443 - 451
  • [4] High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU
    Hu, Xinyi
    He, Debiao
    Luo, Min
    Peng, Cong
    Feng, Qi
    Huang, Xinyi
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2023, 22 (02)
  • [5] A Multi-Party User Authentication and Key Agreement Protocol Based on Public Key Cryptosystem
    Yalamanchili, Sushma
    Rao, M. Kameswara
    Smitha, Ch.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (10): : 80 - 84
  • [6] A Key Management Scheme Based on Key Hypergraph and Identity-based Cryptography in Multi-domain Optical Networks
    Wu Q.
    Wen W.
    1600, Sichuan University (49): : 85 - 92
  • [7] A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme
    Cai, Yang
    Xu, Qiuliang
    Zheng, Zhihua
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 636 - 640
  • [8] Identity-Based Multi-Proxy Signature Scheme in the Standard Model
    Gu, Ke
    Jia, Weijia
    Zhang, Jianming
    FUNDAMENTA INFORMATICAE, 2017, 150 (02) : 179 - 210
  • [9] Combined schemes for signature and encryption: The public-key and the identity-based setting
    Gonzalez Vasco, Maria Isabel
    Hess, Florian
    Steinwandt, Rainer
    INFORMATION AND COMPUTATION, 2016, 247 : 1 - 10
  • [10] Identity-Based Multi-party Revocable Quantum-Resistant Signature with CSP
    Zhang, Yilei
    Wu, Faguo
    Wang, Chenxu
    5TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2019), 2019, : 133 - 141