A Tightly Secure Identity-Based Signature Scheme from Isogenies

被引:1
|
作者
Chen, Jiawei [1 ]
Jo, Hyungrok [2 ]
Sato, Shingo [2 ]
Shikata, Junji [1 ,2 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa, Japan
[2] Yokohama Natl Univ, Inst Adv Sci, Yokohama, Kanagawa, Japan
来源
关键词
Identity-based signature; Isogeny-based cryptography; Post-quantum cryptography; GENERIC CONSTRUCTION;
D O I
10.1007/978-3-031-40003-2_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a tightly secure identity-based signature (IBS) scheme based on the supersingular isogeny problems. Although Shaw and Dutta proposed an isogeny-based IBS scheme with provable security, the security reduction is non-tight. For an IBS scheme with concrete security, the tightness of its security reduction affects the key size and signature size. Hence, it is reasonable to focus on a tight security proof for an isogeny-based IBS scheme. In this paper, we propose an isogeny-based IBS scheme based on the lossy CSI-FiSh signature scheme and give a tight security reduction for this scheme. While the existing isogeny-based IBS has the square-root advantage loss in the security proof, the security proof for our IBS scheme avoids such advantage loss, due to the properties of lossy CSI-FiSh. Moreover, we show that the user key size and signature size of our scheme are better than those sizes of existing isogeny-based IBS schemes, under suitable parameter settings.
引用
收藏
页码:141 / 163
页数:23
相关论文
共 50 条
  • [31] An identity-based proxy signature scheme from pairings
    Shim, Kyung-Ah
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71
  • [32] Identity-based incremental signature scheme from lattices
    Tian, Miaomiao
    Chen, Jing
    Zhong, Hong
    Tongxin Xuebao/Journal on Communications, 2021, 42 (01): : 108 - 117
  • [33] An identity-based signature scheme from the Weil pairing
    Yi, X
    IEEE COMMUNICATIONS LETTERS, 2003, 7 (02) : 76 - 78
  • [34] Identity-based puncturable signature scheme
    Yang D.
    Chen Y.
    Wei J.
    Hu X.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (12): : 17 - 26
  • [35] A Practical Identity-Based Signature Scheme
    LI Chenghua1
    2. Department of Mechanical and Aerospace Engineering
    WuhanUniversityJournalofNaturalSciences, 2008, (06) : 692 - 696
  • [36] Biometric identity-based signature scheme
    Hou, Hongxia
    Wang, Shangping
    Ma, Xiaojing
    Dai, Rendong
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (15): : 149 - 151
  • [37] Identity-Based Secret Signature Scheme
    Lee, Byoungcheon
    Li, Jin
    Kim, Kwangjo
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1080 - +
  • [38] Identity-Based Threshold Signatures from Isogenies
    Atapoor, Shahla
    CRYPTOGRAPHY AND CODING, IMACC 2023, 2024, 14421 : 220 - 240
  • [39] On the security of an identity-based signature scheme
    Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):
  • [40] A New Provably Secure Identity-Based Multi-proxy Signature Scheme
    Chen, Qunshan
    Huang, Zhenjie
    Ding, Yong
    Zhou, Yuping
    Huang, Hui
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 230 - 242