IBUOV, a Provably Secure Identity-Based UOV Signature Scheme

被引:10
|
作者
Shen, Wuqiang [1 ]
Tang, Shaohua [1 ]
Xu, Lingling [1 ]
机构
[1] S China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Guangdong, Peoples R China
关键词
HFE; OIL;
D O I
10.1109/CSE.2013.66
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multivariate Public Key Cryptosystem (MPKC) is one of post-quantum cryptosystems which can potentially resist quantum computer attacks. It has increasingly been seen by some as a possible alternative to public key cryptosystems RSA, ECC, etc., which are widely in use today. Moreover, MPKC schemes are in general much more computationally efficient than number theoretic-based schemes. However, the oversize key poses obstacle on the calculation and transmission in MPKC. We notice the feature and benefit of the identity-based cryptography - the public key is directly gained from the user's identity information. Based on this, we consider introducing the identity-based semantics to MPKC, and it can cut down the size of public key of MPKC. Using the idea of constructing certificate-based Identity-Based Signature (IBS), we propose a novel and secure Identity-Based Unbalanced Oil-Vinegar (IBUOV) signature scheme based on the ordinary Unbalanced Oil-Vinegar (UOV) signature scheme. We provide the provable security to explain that our proposal is secure.
引用
收藏
页码:388 / 395
页数:8
相关论文
共 50 条
  • [31] Provable secure identity-based multi-proxy signature scheme
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (03) : 497 - 512
  • [32] AN EFFICIENT AND SECURE IDENTITY-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
    Yoon, Eun-Jun
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (04): : 323 - 329
  • [33] Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios
    Krzywiecki, Lukasz
    Slowik, Marta
    Szala, Michal
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 310 - 324
  • [34] Efficient and identity-based signcryption with provably-secure
    Wen, Yiling
    Ma, Jianfeng
    Moon, Sangjae
    [J]. International Journal of Digital Content Technology and its Applications, 2010, 4 (07) : 148 - 153
  • [35] A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme
    Cai, Yang
    Xu, Qiuliang
    Zheng, Zhihua
    [J]. PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 636 - 640
  • [36] Analysis and improvement of a provable secure fuzzy identity-based signature scheme
    XIONG Hu
    CHEN YaNan
    ZHU GuoBin
    QIN ZhiGuang
    [J]. Science China(Information Sciences), 2014, 57 (09) : 156 - 160
  • [37] MIDSCYK: An Efficient Provably Secure Multi-Recipient Identity-Based Signcryption Scheme
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    [J]. ICNM: 2009 INTERNATIONAL CONFERENCE ON NETWORKING & MEDIA CONVERGENCE, 2007, : 70 - 75
  • [38] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
  • [39] Provably Secure and Efficient Multi-Receiver Identity-Based Generalized Signcryption Scheme
    Zhou, Caixue
    [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 82 - 88
  • [40] Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments
    Karati, Arijit
    Islam, S. K. Hafizul
    Biswas, G. P.
    Bhuiyan, Md Zakirul Alam
    Vijayakumar, Pandi
    Karuppiah, Marimuthu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2904 - 2914