A Tightly Secure Identity-Based Signature Scheme from Isogenies

被引:1
|
作者
Chen, Jiawei [1 ]
Jo, Hyungrok [2 ]
Sato, Shingo [2 ]
Shikata, Junji [1 ,2 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa, Japan
[2] Yokohama Natl Univ, Inst Adv Sci, Yokohama, Kanagawa, Japan
来源
关键词
Identity-based signature; Isogeny-based cryptography; Post-quantum cryptography; GENERIC CONSTRUCTION;
D O I
10.1007/978-3-031-40003-2_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a tightly secure identity-based signature (IBS) scheme based on the supersingular isogeny problems. Although Shaw and Dutta proposed an isogeny-based IBS scheme with provable security, the security reduction is non-tight. For an IBS scheme with concrete security, the tightness of its security reduction affects the key size and signature size. Hence, it is reasonable to focus on a tight security proof for an isogeny-based IBS scheme. In this paper, we propose an isogeny-based IBS scheme based on the lossy CSI-FiSh signature scheme and give a tight security reduction for this scheme. While the existing isogeny-based IBS has the square-root advantage loss in the security proof, the security proof for our IBS scheme avoids such advantage loss, due to the properties of lossy CSI-FiSh. Moreover, we show that the user key size and signature size of our scheme are better than those sizes of existing isogeny-based IBS schemes, under suitable parameter settings.
引用
收藏
页码:141 / 163
页数:23
相关论文
共 50 条
  • [21] AN EFFICIENT AND SECURE IDENTITY-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
    Yoon, Eun-Jun
    INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (04): : 323 - 329
  • [22] Analysis and improvement of a provable secure fuzzy identity-based signature scheme
    Hu Xiong
    YaNan Chen
    GuoBin Zhu
    ZhiGuang Qin
    Science China Information Sciences, 2014, 57 : 1 - 5
  • [23] Toward Secure Strong Designated Verifier Signature Scheme from Identity-Based System
    Lin, Han-Yu
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (04) : 315 - 321
  • [24] Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios
    Krzywiecki, Lukasz
    Slowik, Marta
    Szala, Michal
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 310 - 324
  • [25] Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the computational Diffie-Hellman Assumption
    Iwasaki, Tomoya
    Yanai, Naoto
    Inamura, Masaki
    Iwamura, Keiichi
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 669 - 676
  • [26] Analysis and improvement of a provable secure fuzzy identity-based signature scheme
    XIONG Hu
    CHEN YaNan
    ZHU GuoBin
    QIN ZhiGuang
    ScienceChina(InformationSciences), 2014, 57 (09) : 156 - 160
  • [27] An efficient and provably secure identity-based signature scheme in the standard model
    Li, Ji-Guo
    Jiang, Ping-Jin
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (11): : 2130 - 2136
  • [28] Lightweight and Secure IoT-Based Payment Protocols from an Identity-Based Signature Scheme
    Wahaballa, Abubaker
    ELECTRONICS, 2022, 11 (21)
  • [29] Identity-based forward secure threshold signature scheme based on mediated rsa
    Yu J.
    Hao R.
    Kong F.
    Cheng X.
    Zhao H.
    Chen Y.
    International Journal of Computers and Applications, 2010, 32 (04) : 469 - 475
  • [30] A secure mobile agent system based on identity-based digital signature scheme
    Lee, Y
    Lee, T
    Chung, I
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 479 - 485