On the General Construction of Tightly Secure Identity-Based Signature Schemes

被引:2
作者
Wu, Ge [1 ,2 ,4 ]
Zhao, Zhen [3 ,4 ]
Guo, Fuchun [4 ]
Susilo, Willy [4 ]
Zhang, Futai [5 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, 2 Southeast Univ Rd, Nanjing 211189, Jiangsu, Peoples R China
[2] Purple Mt Labs, 9 East Mozhou Rd, Nanjing 211111, Jiangsu, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Networks, 2 South Taibai Rd, Xian 710071, Shaanxi, Peoples R China
[4] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Northfield Ave, Wollongong, NSW 2522, Australia
[5] Nanjing Normal Univ, Sch Comp Sci & Technol, 1 Wenyuan Rd, Nanjing 210023, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
general construction; identity-based signature; tight security;
D O I
10.1093/comjnl/bxaa011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A tightly secure scheme has a reduction, where the reduction loss is a small constant. Identity-based signature (IBS) is an important cryptographic primitive, and tightly secure IBS schemes enjoy the advantage that the security parameter can be optimal to achieve a certain security level. General constructions of IBS schemes (Bellare, M., Namprempre, C., and Neven, G. (2004) Security Proofs for Identity-Based Identification and Signature Schemes. In Proc. EUROCRYPT 2004, May 2-6, pp. 268-286. Springer, Berlin, Interlaken, Switzerland; Galindo, D., Herranz, J., and Kiltz, E. (2006) On the Generic Construction of Identity-Based Signatures With Additional Properties. In Proceedings of ASIACRYPT 2006, December 3-7, pp. 178-193. Springer, Berlin, Shanghai, China) and their security have been extensively studied. However, the security is not tight and how to generally construct a tightly secure IBS scheme remains unknown. In this paper, we concentrate on the general constructions of IBS schemes. We first take an insight into previous constructions and analyze the reason why it cannot achieve tight security. To further study possible tightly secure constructions, we propose another general construction, which could be seen as a different framework of IBS schemes. Our construction requires two traditional signature schemes, whereas the construction by Bellare et al. uses one scheme in a two-round iteration. There are no additional operations in our general construction. Its main advantage is providing the possibility of achieving tight security for IBS schemes in the random oracle model. Combining two known signature schemes, we present an efficient IBS scheme with tight security as an example.
引用
收藏
页码:1835 / 1848
页数:14
相关论文
共 29 条
  • [1] Abouelkheir E, 2018, INFORM-J COMPUT INFO, V42, P221
  • [2] Au MH, 2006, LECT NOTES COMPUT SC, V4266, P1
  • [3] On the Impossibility of Tight Cryptographic Reductions
    Bader, Christoph
    Jager, Tibor
    Li, Yong
    Schaege, Sven
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 273 - 304
  • [4] Tightly-Secure Authenticated Key Exchange
    Bader, Christoph
    Hofheinz, Dennis
    Jager, Tibor
    Kiltz, Eike
    Li, Yong
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 : 629 - 658
  • [5] Bellare M, 2004, LECT NOTES COMPUT SC, V3027, P268
  • [6] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
  • [7] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [8] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
  • [9] Boneh D, 2011, LECT NOTES COMPUT SC, V6571, P1, DOI 10.1007/978-3-642-19379-8_1
  • [10] Cash D, 2010, LECT NOTES COMPUT SC, V6110, P523