Two Identity-Based Aggregate Signature Schemes from Pairings

被引:0
|
作者
Sahana, Subhas Chandra [1 ]
Das, Sourav Kumar [1 ]
Mashahary, Sangeeta [1 ]
Bhuyan, Bubu [1 ]
机构
[1] North Eastern Hill Univ, Dept Informat Technol, Shillong 793022, Meghalaya, India
关键词
Signature; Aggregate signature; Bilinear pairing; Computational Diffie-Hellman Problem (CDHP);
D O I
10.1007/978-981-10-7901-6_94
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An aggregate signature is a short digital signature which is the output of aggregation process. The signature aggregation is done on k signatures of k distinct messages from k distinct users. As the produced signature size is shorter, so it will be efficient to use the schemes in low-bandwidth communication environment. In this paper, we proposed two identity-based aggregate signature schemes from bilinear pairing operations. The proposed schemes are secure against existential forgery under adaptively chosen message and identity attack in the random oracle model based on the assumption of intractability of the computational Diffie-Hellman problem (CDHP). The efficiency analysis of the proposed identity-based aggregate signature schemes with other established identity-based aggregate signature schemes is also done in this paper.
引用
收藏
页码:877 / 884
页数:8
相关论文
共 50 条
  • [21] Practical Identity-Based Aggregate Signature from Bilinear Maps
    王竹
    吴倩
    叶顶锋
    陈辉焱
    [J]. Journal of Shanghai Jiaotong University(Science), 2008, 13 (06) : 684 - 687
  • [22] Efficient identity-based blind message recovery signature scheme from pairings
    Verma, Girraj Kumar
    Singh, B. B.
    [J]. IET INFORMATION SECURITY, 2018, 12 (02) : 150 - 156
  • [23] Improvement of an Identity-Based Aggregate Signature Protocol from Lattice
    Dong, Songshou
    Yao, Yanqing
    Zhou, Yihua
    Yang, Yuguang
    [J]. DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 258 - 263
  • [24] On the Security of an Identity-Based Aggregate Signature Scheme
    Yap, Wun-She
    Heng, Swee-Huay
    Goi, Bok-Min
    [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1523 - +
  • [25] Identity-based threshold signature scheme from the bilinear pairings (extended abstract)
    Baek, J
    Zheng, YL
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 124 - 128
  • [26] Identity-Based Directed Signature Scheme without Bilinear Pairings
    Rao, R. R. V. Krishna
    Gayathri, N. B.
    Reddy, P. Vasudeva
    [J]. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (02): : 335 - 353
  • [27] An identity-based threshold ring signature scheme based on the bilinear pairings
    Shang, Jiu-qing
    Xu, Qiu-liang
    Liu, Xin
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 233 - +
  • [28] Feasibility analysis of two identity-based proxy ring signature schemes
    Wang, Huaqun
    Zhang, Lijun
    Zhao, Junxi
    [J]. High Technology Letters, 2007, 13 (02) : 207 - 209
  • [29] Analysis and improvements of two identity-based perfect concurrent signature schemes
    Huang, Zhenjie
    Chen, Kefei
    Lin, Xuanzhi
    Huang, Rufen
    [J]. INFORMATICA, 2007, 18 (03) : 375 - +
  • [30] New identity-based ring signature schemes
    Herranz, J
    Sáez, G
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 27 - 39