Two Identity-Based Aggregate Signature Schemes from Pairings

被引:0
|
作者
Sahana, Subhas Chandra [1 ]
Das, Sourav Kumar [1 ]
Mashahary, Sangeeta [1 ]
Bhuyan, Bubu [1 ]
机构
[1] North Eastern Hill Univ, Dept Informat Technol, Shillong 793022, Meghalaya, India
关键词
Signature; Aggregate signature; Bilinear pairing; Computational Diffie-Hellman Problem (CDHP);
D O I
10.1007/978-981-10-7901-6_94
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An aggregate signature is a short digital signature which is the output of aggregation process. The signature aggregation is done on k signatures of k distinct messages from k distinct users. As the produced signature size is shorter, so it will be efficient to use the schemes in low-bandwidth communication environment. In this paper, we proposed two identity-based aggregate signature schemes from bilinear pairing operations. The proposed schemes are secure against existential forgery under adaptively chosen message and identity attack in the random oracle model based on the assumption of intractability of the computational Diffie-Hellman problem (CDHP). The efficiency analysis of the proposed identity-based aggregate signature schemes with other established identity-based aggregate signature schemes is also done in this paper.
引用
收藏
页码:877 / 884
页数:8
相关论文
共 50 条
  • [41] IDENTITY-BASED SEQUENTIAL AGGREGATE SIGNATURE SCHEME BASED ON RSA
    Dou, Bennian
    Chen, Chun-Hua
    Zhang, Hong
    Xu, Chungen
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (09): : 6401 - 6413
  • [42] Strong Identity-Based Proxy Signature Schemes, Revisited
    Liu, Weiwei
    Mu, Yi
    Yang, Guomin
    Tian, Yangguang
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [43] Security Proofs for Identity-Based Identification and Signature Schemes
    Bellare, Mihir
    Namprempre, Chanathip
    Neven, Gregory
    [J]. JOURNAL OF CRYPTOLOGY, 2009, 22 (01) : 1 - 61
  • [44] Security Proofs for Identity-Based Identification and Signature Schemes
    Mihir Bellare
    Chanathip Namprempre
    Gregory Neven
    [J]. Journal of Cryptology, 2009, 22 : 1 - 61
  • [45] Security proofs for identity-based identification and signature schemes
    Bellare, M
    Namprempre, C
    Neven, G
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 268 - 286
  • [46] Comparing Performance of Hierarchical Identity-Based Signature Schemes
    Chen, Peixin
    Wu, Yilun
    Su, Jinshu
    Wang, Xiaofeng
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (12): : 3181 - 3184
  • [47] Identity-Based Ring Signature Schemes for Multiple Domains
    Ki, JuHee
    Hwang, Jung Yeon
    Lee, Dong Hoon
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (10): : 2692 - 2707
  • [48] Identity-based strong designated verifier signature schemes
    Susilo, W
    Zhang, FG
    Mu, Y
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 313 - 324
  • [49] Identity-Based Chameleon Signature Schemes over Lattices
    Zhang Y.
    Chen Y.
    Liu X.
    Yin Y.
    Hu Y.
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (02): : 757 - 764
  • [50] A Quantum Secure and Noninteractive Identity-Based Aggregate Signature Protocol From Lattices
    Li, Quanrun
    Luo, Min
    Hsu, Chingfang
    Wang, Lianhai
    He, Debiao
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4816 - 4826