Efficient ID-based digital signatures with message recovery

被引:0
|
作者
Tso, Raylin [1 ]
Gu, Chunxiang [2 ]
Okamoto, Takeshi [1 ]
Okamoto, Eiji [1 ]
机构
[1] Univ Tsukuba, Dept Risk Engn, Grad Sch Syst & Informat Engn, Tsukuba, Ibaraki 305, Japan
[2] Informat Engn Univ, Network Engn Dept, Zhengzhou, Peoples R China
来源
关键词
ID-based signature; k-BDHI problem; message recovery; pairing; short signature;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A digital signature with message recovery is a signature that the message itself is not required to be transmitted together with the signature. Comparing with other (non-short) digital signatures, it has the advantage of small data size of communication. This kind of signature schemes have been widely investigated a decade ago, but, no ID-based message recovery signature is proposed until 2005 by Zhang et al. Since, up to the present, no method can be used to shorten ID-based signatures directly, ID-based message recovery signatures are regarded as a useful method to shorten ID-based signatures, in contrast to proposing a short signature scheme. In this paper, two new ID-based signature schemes with message recovery are proposed. The first one can deal with messages of fixed length and the second one can deal with messages of arbitrary length. Similar to Zhang et al.'s schemes, our schemes shows the idea of shortening ID-based signatures. However, our schemes are more efficient than Zhang et al.'s schemes. In addition, after comparing with Boneh et al.'s short signature (which is not ID-based), we find that although the communication cost is still a little larger than that of a short signature, the computational cost of our scheme is less than that of Boneh et al.'s short signature in the verification phase and our schemes surpass a short signature scheme in the concept of ID-based property. Under the hardness of k-BDHI problem, our schemes are proven secure in the random oracle model.
引用
收藏
页码:47 / +
页数:4
相关论文
共 50 条
  • [1] Identity-based partial message recovery signatures (or how to shorten ID-based signatures)
    Zhang, FG
    Susilo, W
    Mu, Y
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 45 - 56
  • [2] Secret handshakes from ID-based message recovery signatures: A new generic approach
    Wen, Yamin
    Zhang, Fangguo
    Xu, Lingling
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (01) : 96 - 104
  • [3] ID-based proxy signature scheme with message recovery
    Singh, Harendra
    Verma, Girraj Kumar
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (01) : 209 - 214
  • [4] New ID-Based Blind Signature Schemes with Message Recovery
    Zheng, Yanbin
    Zhang, Yuting
    [J]. 2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 2020 - 2023
  • [5] Cryptanalysis of an ID-based proxy signature scheme with message recovery
    Tian, M.
    Huang, L.
    Yang, W.
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 419 - 422
  • [6] An Improved ID-based Proxy Signature Scheme with Message Recovery
    Zhou, Caixue
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 151 - 163
  • [7] Provably Secure and Efficient ID-based Strong Designated Verifier Signature Scheme with Message Recovery
    Li, Min
    Fang, Tao
    [J]. 2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014), 2014, : 287 - 293
  • [8] A NEW ID-BASED PROXY BLIND SIGNATURE SCHEME WITH MESSAGE RECOVERY
    Kong, Tingting
    Xu, Qiuliang
    Wong, Zhiqiang
    [J]. 3RD INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE (IEEC 2011), PROCEEDINGS, 2011, : 162 - 165
  • [9] Batch verifications with ID-based signatures
    Yoon, HJ
    Cheon, JH
    Kim, Y
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2004, 2004, 3506 : 233 - 248
  • [10] ID-based ring proxy signatures
    Wei, Baodian
    Zhang, Fangguo
    Chen, Xiaofeng
    [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 1031 - +