Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme

被引:11
|
作者
Karati, Arijit [1 ]
Biswas, G. P. [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
IBE; pairing-based cryptography; DH assumption; random oracle; short signature scheme; signcryption scheme; HIBE;
D O I
10.1002/sec.1588
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption (IBE) is one of the important public key encryption techniques where not only the identity of the receiver is used for secure and efficient encryption, but it also has several merits over other traditional public-key ones. However, two main disadvantages of many such IBE-based systems are the requirement of a large number of public parameters and different random oracle operations, where it is known that a random oracle due to improper implementation is vulnerable under chosen ciphertext attack. This paper designs an efficient IBE scheme (ROFIBE) with recipient anonymity, reduction in public parameters and random oracle-free operation. The scheme is developed based on a proposed hard problem, named as decisional extended bilinear Diffie-Hellman assumption (DEBDH) and on analysis it is found to be secured under standard security model. In addition, a new short-signature scheme based on the proposed IBE is developed under the difficulty of solving proposed q-extended bilinear strong Diffie-Hellman assumption (q-EBSDH). As performance analysis, we compare both the proposed schemes with other existing related ones and find that our schemes are computationally and communicationally efficient and effectively usable in real life applications. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:4060 / 4074
页数:15
相关论文
共 50 条
  • [1] A Pairing Free Secure Identity-based Aggregate Signature Scheme under Random Oracle
    Abouelkheir, Eman
    Tromp, Jolanda G.
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2018, 42 (02): : 221 - 228
  • [2] An efficient and provably secure identity-based signature scheme in the standard model
    Li, Ji-Guo
    Jiang, Ping-Jin
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (11): : 2130 - 2136
  • [3] Identity-based multi-proxy multi-signature scheme provably secure in random oracle model
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2015, 26 (04): : 547 - 558
  • [4] Efficient pairing-free provably secure identity-based proxy blind signature scheme
    Tan, Zuowen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (05) : 593 - 601
  • [5] Efficient Pairing-Free Provably Secure Scalable Revocable Identity-Based Signature Scheme
    Wang, Chang-Ji
    Huang, Hui
    Yuan, Yuan
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 503 - 509
  • [6] IBUOV, a Provably Secure Identity-Based UOV Signature Scheme
    Shen, Wuqiang
    Tang, Shaohua
    Xu, Lingling
    [J]. 2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 388 - 395
  • [7] Provably Secure Identity-Based Encryption and Signature over Cyclotomic Fields
    Wang, Yang
    Wang, Mingqiang
    Zou, Jingdan
    Xu, Jin
    Wang, Jing
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [8] Secure Identity-Based Encryption in the Quantum Random Oracle Model
    Zhandry, Mark
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 758 - 775
  • [9] Secure identity-based encryption in the quantum random oracle model
    Zhandry, Mark
    [J]. INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2015, 13 (04)
  • [10] Efficient Provably Secure Designated Verifier Signature Scheme without Random Oracle
    Zhang, Jianhong
    Geng, Qin
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 29 - 33