Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography

被引:7
作者
Feng, Qi [1 ,2 ]
He, Debiao [1 ,2 ]
Wang, Huaqun [3 ]
Wang, Ding [4 ]
Huang, Xinyi [5 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210023, Peoples R China
[4] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[5] Fujian Normal Univ, Ctr Appl Math Fujian Prov, Fujian Prov Key Lab Network Secur & Cryptology, Coll Math & Informat, Fuzhou 350117, Peoples R China
基金
中国国家自然科学基金;
关键词
protocols; cryptographic protocols; cryptography; digital signatures; authorisation; telecommunication security; private key cryptography; public key cryptography; multiparty key generation protocol; identity-based signature scheme; IEEE P1363 standard; identity-based cryptography; promising mechanism; lightweight authentication; powerful access control; inherent problems; key escrow; secure channel; effective key issuing protocol; distributed setting; weaker assumptions; trusted party; key distribution; ELLIPTIC-CURVES; ENCRYPTION;
D O I
10.1049/iet-ifs.2020.0096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based cryptography (IBC) is considered as a promising mechanism in the Internet of Things andad-hocnetworks, providing lightweight authentication and powerful access control. However, it suffers from two inherent problems, i.e. key escrow and the requirement of a secure channel, which are not always good properties in many realistic scenarios. Thus, an efficient key issuing protocol in a distributed setting without the assumption of the secure channel is needed. In this study, the authors give special attention to the IBC standardised inIEEE P1363and design a multi-party setup and key issuing protocol for it. Their protocol is proven to be malicious secure by simulation under weaker assumptions. Contrast to prior works that rely on a trusted party for key distribution or the strong assumption of a secure channel, they provide the first practical solution for the distributed architectures.
引用
收藏
页码:724 / 732
页数:9
相关论文
共 31 条
  • [31] Efficient discrete logarithm based multi-signature scheme in the plain public key model
    Ma, Changshe
    Weng, Jian
    Li, Yingjiu
    Deng, Robert
    DESIGNS CODES AND CRYPTOGRAPHY, 2010, 54 (02) : 121 - 133