Practical Hidden Identity-based Signature Scheme from Bilinear Pairings

被引:0
|
作者
Liu Xin [1 ,2 ]
Xu Qiu-liang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan, Peoples R China
[2] Shandong Youth Univ Polit Sci, Dept Informat Engn, Jinan, Peoples R China
基金
中国国家自然科学基金;
关键词
group signatures; hidden identity-based signatures; unlinkable randomizable signatures; Sigma-compiler;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Hidden identity-based signatures (abbreviated as Hidden-IDS) can be seen as a variant of the traditional notion of group signatures. Compared with group signature schemes, Hidden-IBS is more attractive in the application of identity-management systems and anonymous credential systems. In Financial Cryptography 2007, Kiayias and Zhou firstly proposed the Hidden-IBS from bilinear pamngs. Unfortunately, the Kiayias-Zhou scheme fails to fulfill exculpability and CCA2-anonymity, which are vital properties for group signature scheme and Hidden-IBS. This paper presents a revised scheme by incorporating the techniques of unlinkable randomizable signatures and the Sigma-compiler of Furukawa et al. The new scheme enhances security of the Kiayias-Zhou scheme and preserves a desirable property of the original scheme, i. e., concurrent join. Moreover, another essential improvement in the revised scheme is efficiency. Concretely, the processes of signature generation and verification are more efficient than those of the Kiayias-Zhou scheme, and the resulted signature is only half of the latter one's.
引用
收藏
页码:97 / 102
页数:6
相关论文
共 50 条
  • [1] An identity-based ring signature scheme from bilinear pairings
    Lin, CY
    Wu, TC
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 182 - 185
  • [2] An identity-based proxy ring signature scheme from bilinear pairings
    Cheng, WQ
    Lang, WM
    Yang, ZK
    Liu, G
    Tan, YM
    [J]. ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 424 - 429
  • [3] An efficient identity-based short signature scheme from bilinear pairings
    Du, Hongzhen
    Wen, Qiaoyan
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 725 - +
  • [4] Identity-Based Directed Signature Scheme without Bilinear Pairings
    Rao, R. R. V. Krishna
    Gayathri, N. B.
    Reddy, P. Vasudeva
    [J]. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (02): : 335 - 353
  • [5] An identity-based threshold ring signature scheme based on the bilinear pairings
    Shang, Jiu-qing
    Xu, Qiu-liang
    Liu, Xin
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 233 - +
  • [6] A practical identity-based signature scheme from bilinear map
    Wang, Zhu
    Chen, Huiyan
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 704 - +
  • [7] An Identity-Based Proxy Signature from Bilinear Pairings
    Ji, Huifang
    Han, Wenbao
    Zhao, Long
    Wang, Yongjuan
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 14 - 17
  • [8] Identity-based threshold signature scheme from the bilinear pairings (extended abstract)
    Baek, J
    Zheng, YL
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 124 - 128
  • [9] An efficient identity-based blind signature scheme without bilinear pairings
    He, Debiao
    Chen, Jianhua
    Zhang, Rui
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (04) : 444 - 450
  • [10] An Efficient Fuzzy Identity-based Signature Scheme without Bilinear Pairings
    Wang, Changji
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 440 - 444