A Tightly Secure Identity-Based Signature Scheme from Isogenies

被引:1
|
作者
Chen, Jiawei [1 ]
Jo, Hyungrok [2 ]
Sato, Shingo [2 ]
Shikata, Junji [1 ,2 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa, Japan
[2] Yokohama Natl Univ, Inst Adv Sci, Yokohama, Kanagawa, Japan
来源
关键词
Identity-based signature; Isogeny-based cryptography; Post-quantum cryptography; GENERIC CONSTRUCTION;
D O I
10.1007/978-3-031-40003-2_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a tightly secure identity-based signature (IBS) scheme based on the supersingular isogeny problems. Although Shaw and Dutta proposed an isogeny-based IBS scheme with provable security, the security reduction is non-tight. For an IBS scheme with concrete security, the tightness of its security reduction affects the key size and signature size. Hence, it is reasonable to focus on a tight security proof for an isogeny-based IBS scheme. In this paper, we propose an isogeny-based IBS scheme based on the lossy CSI-FiSh signature scheme and give a tight security reduction for this scheme. While the existing isogeny-based IBS has the square-root advantage loss in the security proof, the security proof for our IBS scheme avoids such advantage loss, due to the properties of lossy CSI-FiSh. Moreover, we show that the user key size and signature size of our scheme are better than those sizes of existing isogeny-based IBS schemes, under suitable parameter settings.
引用
收藏
页码:141 / 163
页数:23
相关论文
共 50 条
  • [41] A secure mobile agent system applying identity-based digital signature scheme
    Kim, S
    Chung, I
    EURASIA-ICT 2002: INFORMATION AND COMMUNICATION TECHNOLOGY, PROCEEDINGS, 2002, 2510 : 588 - 596
  • [42] Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments
    Jia Yu
    Hui Xia
    Huawei Zhao
    Rong Hao
    Zhangjie Fu
    Xiangguo Cheng
    Wireless Personal Communications, 2016, 86 : 1467 - 1491
  • [43] Adaptive-ID Secure Identity-Based Signature Scheme from Lattices in the Standard Model
    Wang, Zecheng
    Chen, Xuemin
    Wang, Pingshui
    IEEE ACCESS, 2017, 5 : 20791 - 20799
  • [44] A novel and provably secure identity-based blind signature scheme for online transactions
    Kumar, Sunil
    Mittal, Gaurav
    Yadav, Arvind
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2025, 50 (02):
  • [45] Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments
    Yu, Jia
    Xia, Hui
    Zhao, Huawei
    Hao, Rong
    Fu, Zhangjie
    Cheng, Xiangguo
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 86 (03) : 1467 - 1491
  • [46] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [47] Identity-based signature scheme from lattices and its application
    Chen, L. (cl@huel.edu.cn), 1600, ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan (07):
  • [48] Identity-Based Linearly Homomorphic Signature Scheme from Lattice
    Wang, Shang-Ping
    Di, Wei-Biao
    Deng, Yin-Juan
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 149 - 154
  • [49] An identity-based ring signature scheme from bilinear pairings
    Lin, CY
    Wu, TC
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 182 - 185
  • [50] Scalable Hierarchical Identity-based Signature Scheme from Lattices
    Noh, Geontae
    Jeong, Ik Rae
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3261 - 3273