IBUOV, a Provably Secure Identity-Based UOV Signature Scheme

被引:10
|
作者
Shen, Wuqiang [1 ]
Tang, Shaohua [1 ]
Xu, Lingling [1 ]
机构
[1] S China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Guangdong, Peoples R China
关键词
HFE; OIL;
D O I
10.1109/CSE.2013.66
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multivariate Public Key Cryptosystem (MPKC) is one of post-quantum cryptosystems which can potentially resist quantum computer attacks. It has increasingly been seen by some as a possible alternative to public key cryptosystems RSA, ECC, etc., which are widely in use today. Moreover, MPKC schemes are in general much more computationally efficient than number theoretic-based schemes. However, the oversize key poses obstacle on the calculation and transmission in MPKC. We notice the feature and benefit of the identity-based cryptography - the public key is directly gained from the user's identity information. Based on this, we consider introducing the identity-based semantics to MPKC, and it can cut down the size of public key of MPKC. Using the idea of constructing certificate-based Identity-Based Signature (IBS), we propose a novel and secure Identity-Based Unbalanced Oil-Vinegar (IBUOV) signature scheme based on the ordinary Unbalanced Oil-Vinegar (UOV) signature scheme. We provide the provable security to explain that our proposal is secure.
引用
收藏
页码:388 / 395
页数:8
相关论文
共 50 条
  • [1] An efficient and provably secure identity-based signature scheme in the standard model
    Li, Ji-Guo
    Jiang, Ping-Jin
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (11): : 2130 - 2136
  • [2] A New Provably Secure Identity-Based Multi-proxy Signature Scheme
    Chen, Qunshan
    Huang, Zhenjie
    Ding, Yong
    Zhou, Yuping
    Huang, Hui
    [J]. CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 230 - 242
  • [3] A Provably Secure Scalable Revocable Identity-Based Signature Scheme Without Bilinear Pairings
    Wang, Changji
    Huang, Hui
    Yuan, Yuan
    [J]. SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 588 - 597
  • [4] Provably secure identity-based threshold unsigncryption scheme
    Yang, Bo
    Yu, Yong
    Li, Fagen
    Sun, Ying
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 114 - +
  • [5] Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9
    Lai, Jianchang
    Huang, Xinyi
    He, Debiao
    Wu, Wei
    [J]. COMPUTER JOURNAL, 2022, 65 (07): : 1692 - 1701
  • [6] A provably secure identity-based proxy ring signature based on RSA
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1223 - 1236
  • [7] Provably Secure Pairing-Free Identity-Based Restrictive Partially Blind Signature Scheme
    Cui, Wei
    Jia, Qian
    [J]. PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 1038 - 1042
  • [8] Efficient pairing-free provably secure identity-based proxy blind signature scheme
    Tan, Zuowen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (05) : 593 - 601
  • [9] Efficient Pairing-Free Provably Secure Scalable Revocable Identity-Based Signature Scheme
    Wang, Chang-Ji
    Huang, Hui
    Yuan, Yuan
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 503 - 509
  • [10] Provably Secure Identity-Based Encryption and Signature over Cyclotomic Fields
    Wang, Yang
    Wang, Mingqiang
    Zou, Jingdan
    Xu, Jin
    Wang, Jing
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019