Two Identity-Based Aggregate Signature Schemes from Pairings

被引:0
|
作者
Sahana, Subhas Chandra [1 ]
Das, Sourav Kumar [1 ]
Mashahary, Sangeeta [1 ]
Bhuyan, Bubu [1 ]
机构
[1] North Eastern Hill Univ, Dept Informat Technol, Shillong 793022, Meghalaya, India
关键词
Signature; Aggregate signature; Bilinear pairing; Computational Diffie-Hellman Problem (CDHP);
D O I
10.1007/978-981-10-7901-6_94
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An aggregate signature is a short digital signature which is the output of aggregation process. The signature aggregation is done on k signatures of k distinct messages from k distinct users. As the produced signature size is shorter, so it will be efficient to use the schemes in low-bandwidth communication environment. In this paper, we proposed two identity-based aggregate signature schemes from bilinear pairing operations. The proposed schemes are secure against existential forgery under adaptively chosen message and identity attack in the random oracle model based on the assumption of intractability of the computational Diffie-Hellman problem (CDHP). The efficiency analysis of the proposed identity-based aggregate signature schemes with other established identity-based aggregate signature schemes is also done in this paper.
引用
收藏
页码:877 / 884
页数:8
相关论文
共 50 条
  • [1] On the security of two identity-based signature schemes based on pairings
    Qin, Zhen
    Yuan, Chen
    Wang, Yilei
    Xiong, Hu
    [J]. INFORMATION PROCESSING LETTERS, 2016, 116 (06) : 416 - 418
  • [2] Identity-based proxy signature from pairings
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Seberry, Jennifer
    Huang, Xinyi
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 22 - +
  • [3] An identity based aggregate signature from pairings
    Yu, Yike
    Zheng, Xuefeng
    Sun, Hua
    [J]. Journal of Networks, 2011, 6 (04) : 631 - 637
  • [4] New identity-based society oriented signature schemes from pairings on elliptic curves
    Lin, CY
    Wu, TC
    Zhang, FG
    Hwang, JJ
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 160 (01) : 245 - 260
  • [5] An identity-based proxy signature scheme from pairings
    Shim, Kyung-Ah
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71
  • [6] An Identity-Based Proxy Signature from Bilinear Pairings
    Ji, Huifang
    Han, Wenbao
    Zhao, Long
    Wang, Yongjuan
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 14 - 17
  • [7] Identity-Based Aggregate and Multi-Signature Schemes Based on RSA
    Bagherzandi, Ali
    Jarecki, Stanislaw
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 480 - 498
  • [8] An identity-based ring signature scheme from bilinear pairings
    Lin, CY
    Wu, TC
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 182 - 185
  • [9] Identity-Based Threshold Proxy Signature from Bilinear Pairings
    Liu, Jenshiuh
    Huang, Shaonong
    [J]. INFORMATICA, 2010, 21 (01) : 41 - 56
  • [10] IDENTITY-BASED MULTISIGNATURE AND AGGREGATE SIGNATURE SCHEMES FROM M-TORSION GROUPS
    Cheng Xiangguo Liu Jingmei Guo Lifeng* ** Wang Xinmei (National Key Laboratory of Integrated Services Networks
    [J]. Journal of Electronics(China), 2006, (04) : 569 - 573