Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography

被引:7
作者
Feng, Qi [1 ,2 ]
He, Debiao [1 ,2 ]
Wang, Huaqun [3 ]
Wang, Ding [4 ]
Huang, Xinyi [5 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210023, Peoples R China
[4] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[5] Fujian Normal Univ, Ctr Appl Math Fujian Prov, Fujian Prov Key Lab Network Secur & Cryptology, Coll Math & Informat, Fuzhou 350117, Peoples R China
基金
中国国家自然科学基金;
关键词
protocols; cryptographic protocols; cryptography; digital signatures; authorisation; telecommunication security; private key cryptography; public key cryptography; multiparty key generation protocol; identity-based signature scheme; IEEE P1363 standard; identity-based cryptography; promising mechanism; lightweight authentication; powerful access control; inherent problems; key escrow; secure channel; effective key issuing protocol; distributed setting; weaker assumptions; trusted party; key distribution; ELLIPTIC-CURVES; ENCRYPTION;
D O I
10.1049/iet-ifs.2020.0096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based cryptography (IBC) is considered as a promising mechanism in the Internet of Things andad-hocnetworks, providing lightweight authentication and powerful access control. However, it suffers from two inherent problems, i.e. key escrow and the requirement of a secure channel, which are not always good properties in many realistic scenarios. Thus, an efficient key issuing protocol in a distributed setting without the assumption of the secure channel is needed. In this study, the authors give special attention to the IBC standardised inIEEE P1363and design a multi-party setup and key issuing protocol for it. Their protocol is proven to be malicious secure by simulation under weaker assumptions. Contrast to prior works that rely on a trusted party for key distribution or the strong assumption of a secure channel, they provide the first practical solution for the distributed architectures.
引用
收藏
页码:724 / 732
页数:9
相关论文
共 31 条
  • [21] An improved two-party identity-based authenticated key agreement protocol using pairings
    Hoelbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (01) : 142 - 150
  • [22] A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Vijayakumar, Pandi
    Kumar, Neeraj
    Park, YoHan
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 1732 - 1741
  • [23] Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings
    Reddy, P. Vasudeva
    Babu, A. Ramesh
    Gayathri, N. B.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (10) : 1211 - 1218
  • [24] Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices
    Xie, Congge
    Weng, Jian
    Wen, Jinming
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [25] Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography
    He, Debiao
    Zeadally, Sherali
    Wu, Libing
    Wang, Huaqun
    COMPUTER NETWORKS, 2017, 128 : 154 - 163
  • [26] New identity-based key-insulated convertible multi-authenticated encryption scheme
    Hsu, Chien-Lung
    Lin, Han-Yu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (05) : 1724 - 1731
  • [27] A secure channel protocol for multi-application smart cards based on public key cryptography
    Markantonakis, K
    Mayes, K
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 175 : 79 - 95
  • [28] Efficient Identity-Based Parallel Key-Insulated Signature Scheme using Pairings over Elliptic Curves
    Amarapu, R. B.
    Reddy, P. V.
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2018, 77 (01): : 24 - 28
  • [29] Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model
    Lai, Qiqi
    Yang, Bo
    Xia, Zhe
    Li, Yannan
    Chen, Yuan
    Li, Zhenlong
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 589 - 606
  • [30] Efficient discrete logarithm based multi-signature scheme in the plain public key model
    Changshe Ma
    Jian Weng
    Yingjiu Li
    Robert Deng
    Designs, Codes and Cryptography, 2010, 54 : 121 - 133