Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9

被引:4
|
作者
Lai, Jianchang [1 ]
Huang, Xinyi [1 ]
He, Debiao [2 ]
Wu, Wei [1 ]
机构
[1] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Ctr Appl Math Fujian Prov, Coll Math & Informat, Fuzhou 350000, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan 430072, Peoples R China
来源
COMPUTER JOURNAL | 2022年 / 65卷 / 07期
基金
中国国家自然科学基金;
关键词
SM9; online; offline signature; identity-based cryptosystem; ENCRYPTION;
D O I
10.1093/comjnl/bxab009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
SM9 is a Chinese cryptography standard, which includes a set of identity-based cryptographic schemes over pairings. SM9 identity-based signature scheme (SM9-IBS) was standardized by ISO/IEC and has been widely used in many real-world applications such as blockchain. Nevertheless, the signing algorithm of SM9-IBS suffers from several heavy calculations (e.g. pairings, scalar multiplications in groups), which might be a bottleneck for lightweight devices such as sensors. In this paper, we modify the SM9-IBS scheme slightly to support fast signing. In order to achieve this, we make the use of online/offline methodology and propose a new online/offline IBS scheme based on SM9. The proposed scheme is proved to be EUF-sID-CMA secure and is about 99% faster than SM9-IBS in terms of signature generation. Precisely, the time cost of online signing is <1 ms. Our scheme is appropriate for the Internet of Things. The theoretical analysis and demonstration show that the proposed scheme is comparable to existing efficient online/offline IBS schemes.
引用
收藏
页码:1692 / 1701
页数:10
相关论文
共 50 条
  • [1] Attribute-Based Online/Offline Signature Scheme Based on SM9
    Zhu, Liufu
    Li, Jiguo
    Lai, Jianchang
    Huang, Xinyi
    Zhang, Yichen
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (02): : 362 - 370
  • [2] IBUOV, a Provably Secure Identity-Based UOV Signature Scheme
    Shen, Wuqiang
    Tang, Shaohua
    Xu, Lingling
    [J]. 2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 388 - 395
  • [3] An Efficient Identity-Based Broadcast Encryption Scheme Based on SM9
    Lai, Jian-Chang
    Huang, Xin-Yi
    He, De-Biao
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (05): : 897 - 907
  • [4] A New Provably Secure Identity-Based Multi-proxy Signature Scheme
    Chen, Qunshan
    Huang, Zhenjie
    Ding, Yong
    Zhou, Yuping
    Huang, Hui
    [J]. CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 230 - 242
  • [5] Secure Identity-Based Blind Signature Scheme for Online Transactions
    Lunzhi Deng
    Xiuru He
    Tian Xia
    [J]. Wireless Personal Communications, 2021, 116 : 1525 - 1537
  • [6] Secure Identity-Based Blind Signature Scheme for Online Transactions
    Deng, Lunzhi
    He, Xiuru
    Xia, Tian
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 1525 - 1537
  • [7] An identity-based online/offline secure cloud storage auditing scheme
    Rabaninejad, Reyhaneh
    Asaar, Maryam Rajabzadeh
    Attari, Mahmoud Ahmadian
    Aref, Mohammad Reza
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 1455 - 1468
  • [8] An identity-based online/offline secure cloud storage auditing scheme
    Reyhaneh Rabaninejad
    Maryam Rajabzadeh Asaar
    Mahmoud Ahmadian Attari
    Mohammad Reza Aref
    [J]. Cluster Computing, 2020, 23 : 1455 - 1468
  • [9] Secure Threshold Ring Signature Based on SM9
    Liu, Shuanggen
    Chen, Kang
    Liu, Zikang
    Wang, Teng
    [J]. IEEE ACCESS, 2021, 9 : 95507 - 95516
  • [10] Provably secure identity-based threshold unsigncryption scheme
    Yang, Bo
    Yu, Yong
    Li, Fagen
    Sun, Ying
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 114 - +