A Practical Identity-Based Signature Scheme

被引:0
|
作者
LI Chenghua1
2. Department of Mechanical and Aerospace Engineering
机构
关键词
identity-based signature(IBS); key escrow; key update; key-insulated signature;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Many identity-based signature (IBS) schemes solving key escrow were proposed. But the updating of the private keys wasn’t discussed in these literatures. For the problem of key update, an identity-based key-insulated signature scheme with secure key updates has been proposed. But their scheme inherited the key escrow property. In this paper, we propose a new identity-based strong key-insulated signature scheme without key escrow. It makes the IBS scheme more applicable to the real world. After analyzing the security and the performance, an application example in E-passport passive authentication scenario is described.
引用
收藏
页码:692 / 696
页数:5
相关论文
共 50 条
  • [21] Identity-based signature scheme based on quadratic residues
    Chai ZhenChuan
    Cao ZhenFu
    Dong XiaoLei
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 373 - 380
  • [22] Identity-based signature scheme based on quadratic residues
    CHAI ZhenChuan
    Science in China(Series F:Information Sciences), 2007, (03) : 373 - 380
  • [23] Practical Identity-Based Signature for Wireless Sensor Networks
    Li, Fagen
    Zhong, Di
    Takagi, Tsuyoshi
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2012, 1 (06) : 637 - 640
  • [24] Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme
    Behnia, Rouzbeh
    Tan, Syh-Yuan
    Heng, Swee-Huay
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 474 - 477
  • [25] An efficient identity-based signature scheme with provable security
    Yi, Peng
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Wang, Huaqun
    Zhang, Yichen
    Chen, Yu
    INFORMATION SCIENCES, 2021, 576 : 790 - 799
  • [26] An identity-based proxy signature scheme from pairings
    Shim, Kyung-Ah
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71
  • [27] A tight security reduction identity-based signature scheme
    Kang, Li
    Lu, Xianhui
    Tang, Xiaohu
    Fan, Jia
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 730 - 734
  • [28] Identity-based traceable ring signature scheme on lattice
    Ye Q.
    Chen Q.
    Dou Y.
    Zhang J.
    Tang Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (02): : 161 - 168
  • [29] Identity-based incremental signature scheme from lattices
    Tian, Miaomiao
    Chen, Jing
    Zhong, Hong
    Tongxin Xuebao/Journal on Communications, 2021, 42 (01): : 108 - 117
  • [30] Identity-based quantum signature scheme with strong security
    Xiangjun Xin
    Zhuo Wang
    Qinglan Yang
    Optical and Quantum Electronics, 2019, 51