A Practical Identity-Based Signature Scheme

被引:0
|
作者
LI Chenghua1
2. Department of Mechanical and Aerospace Engineering
机构
关键词
identity-based signature(IBS); key escrow; key update; key-insulated signature;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Many identity-based signature (IBS) schemes solving key escrow were proposed. But the updating of the private keys wasn’t discussed in these literatures. For the problem of key update, an identity-based key-insulated signature scheme with secure key updates has been proposed. But their scheme inherited the key escrow property. In this paper, we propose a new identity-based strong key-insulated signature scheme without key escrow. It makes the IBS scheme more applicable to the real world. After analyzing the security and the performance, an application example in E-passport passive authentication scenario is described.
引用
收藏
页码:692 / 696
页数:5
相关论文
共 50 条
  • [1] A practical identity-based signature scheme from bilinear map
    Wang, Zhu
    Chen, Huiyan
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 704 - +
  • [2] Practical Hidden Identity-based Signature Scheme from Bilinear Pairings
    Liu Xin
    Xu Qiu-liang
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 97 - 102
  • [3] Identity-based puncturable signature scheme
    Yang D.
    Chen Y.
    Wei J.
    Hu X.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (12): : 17 - 26
  • [4] Biometric identity-based signature scheme
    Hou, Hongxia
    Wang, Shangping
    Ma, Xiaojing
    Dai, Rendong
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (15): : 149 - 151
  • [5] Identity-Based Secret Signature Scheme
    Lee, Byoungcheon
    Li, Jin
    Kim, Kwangjo
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1080 - +
  • [6] On the security of an identity-based signature scheme
    Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):
  • [7] A practical identity-based signcryption scheme
    Chen, Huiyan
    Li, Yong
    Ren, Jinping
    International Journal of Network Security, 2013, 15 (06) : 484 - 489
  • [8] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [9] Identity-based authenticated blind signature scheme
    Department of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 20009, China
    不详
    Jisuanji Gongcheng, 2006, 14 (136-137):
  • [10] Identity-Based Linkable Ring Signature Scheme
    Deng, Lunzhi
    Jiang, Yuhong
    Ning, Bingqin
    IEEE ACCESS, 2019, 7 : 153969 - 153976