Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems

被引:21
作者
Chen, Jiahui [1 ]
Ling, Jie [1 ]
Ning, Jianting [2 ]
Ding, Jintai [3 ]
机构
[1] Guangdong Univ Technol, Fac Comp, Guangzhou, Guangdong, Peoples R China
[2] Natl Univ Singapore, Sch Comp, Singapore, Singapore
[3] Univ Cincinnati, Cincinnati, OH 45221 USA
关键词
ID-based signature; post-quantum cryptography; multivariate public key cryptosystems; key distribution center; UNBALANCED OIL; CRYPTANALYSIS; ALGORITHMS; RAINBOW; SYSTEMS; ATTACK; UOV;
D O I
10.1093/comjnl/bxz013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we proposed an idea to construct a general multivariate public key cryptographic (MPKC) scheme based on a user's identity. In our construction, each user is distributed a unique identity by the key distribution center (KDC) and we use this key to generate user's private keys. Thereafter, we use these private keys to produce the corresponding public key. This method can make key generating process easier so that the public key will reduce from dozens of Kilobyte to several bits. We then use our general scheme to construct practical identity-based signature schemes named ID-UOV and ID-Rainbow based on two well-known and promising MPKC signature schemes, respectively. Finally, we present the security analysis and give experiments for all of our proposed schemes and the baseline schemes. Comparison shows that our schemes are both efficient and practical.
引用
收藏
页码:1132 / 1147
页数:16
相关论文
共 36 条
  • [1] Hybrid approach for solving multivariate systems over finite fields
    Bettale, Luk
    Faugere, Jean-Charles
    Perret, Ludovic
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2009, 3 (03) : 177 - 197
  • [2] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
  • [3] The Magma algebra system .1. The user language
    Bosma, W
    Cannon, J
    Playoust, C
    [J]. JOURNAL OF SYMBOLIC COMPUTATION, 1997, 24 (3-4) : 235 - 265
  • [4] Cao WW, 2011, LECT NOTES COMPUT SC, V6672, P168, DOI 10.1007/978-3-642-21031-0_13
  • [5] Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18
  • [6] Practical Cryptanalysis of a Public Key Cryptosystem Based on the Morphism of Polynomials Problem
    Chen, Jaihui
    Tan, Chik How
    Li, Xiaoyu
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (06) : 671 - 679
  • [7] HS-Sign: A Security Enhanced UOV Signature Scheme Based on Hyper-Sphere
    Chen, Jiahui
    Tang, Shaohua
    Zhang, Xinglin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (06): : 3166 - 3187
  • [8] Online/offline signature based on UOV in wireless sensor networks
    Chen, Jiahui
    Tang, Shaohua
    He, Daojing
    Tan, Yang
    [J]. WIRELESS NETWORKS, 2017, 23 (06) : 1719 - 1730
  • [9] Courtois N, 2000, LECT NOTES COMPUT SC, V1807, P392
  • [10] Courtois N.T., 2001, ADV CRYPTOLOGY ASIAC, V2248, P402, DOI 10.1007/3-540-45682-124