Practical Hidden Identity-based Signature Scheme from Bilinear Pairings

被引:0
|
作者
Liu Xin [1 ,2 ]
Xu Qiu-liang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan, Peoples R China
[2] Shandong Youth Univ Polit Sci, Dept Informat Engn, Jinan, Peoples R China
基金
中国国家自然科学基金;
关键词
group signatures; hidden identity-based signatures; unlinkable randomizable signatures; Sigma-compiler;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Hidden identity-based signatures (abbreviated as Hidden-IDS) can be seen as a variant of the traditional notion of group signatures. Compared with group signature schemes, Hidden-IBS is more attractive in the application of identity-management systems and anonymous credential systems. In Financial Cryptography 2007, Kiayias and Zhou firstly proposed the Hidden-IBS from bilinear pamngs. Unfortunately, the Kiayias-Zhou scheme fails to fulfill exculpability and CCA2-anonymity, which are vital properties for group signature scheme and Hidden-IBS. This paper presents a revised scheme by incorporating the techniques of unlinkable randomizable signatures and the Sigma-compiler of Furukawa et al. The new scheme enhances security of the Kiayias-Zhou scheme and preserves a desirable property of the original scheme, i. e., concurrent join. Moreover, another essential improvement in the revised scheme is efficiency. Concretely, the processes of signature generation and verification are more efficient than those of the Kiayias-Zhou scheme, and the resulted signature is only half of the latter one's.
引用
收藏
页码:97 / 102
页数:6
相关论文
共 50 条
  • [21] An Efficient Identity-Based Signcryption Scheme Without Bilinear Pairings
    Elkamchouchi, Hassan
    Abou El-kheir, Eman
    Abouelseoud, Yasmine
    [J]. 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2013, : 80 - 85
  • [22] A Practical Identity-Based Signature Scheme
    LI Chenghua1
    2. Department of Mechanical and Aerospace Engineering
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 692 - 696
  • [23] An Identity-Based Blind Signature Scheme with Message Recovery from Pairings
    Wen, Yihong
    Peng, Cong
    Wang, Shicheng
    Li, Li
    Luo, Min
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2021, 2021, 12809 : 42 - 55
  • [24] An identity-based strongly unforgeable signature without random oracles from bilinear pairings
    Kwon, Saeran
    [J]. INFORMATION SCIENCES, 2014, 276 : 1 - 9
  • [25] Identity-based proxy signature from pairings
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Seberry, Jennifer
    Huang, Xinyi
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 22 - +
  • [26] Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings
    Qi Yanfeng
    Tang Chunming
    Lou Yu
    Xu Maozhi
    Guo Baoan
    [J]. CHINA COMMUNICATIONS, 2013, 10 (11) : 37 - 41
  • [27] Efficient identity-based blind message recovery signature scheme from pairings
    Verma, Girraj Kumar
    Singh, B. B.
    [J]. IET INFORMATION SECURITY, 2018, 12 (02) : 150 - 156
  • [28] An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    [J]. COMPUTER JOURNAL, 2015, 58 (04): : 1021 - 1039
  • [29] An Identity Based Public Key Cryptography Blind Signature Scheme from Bilinear Pairings
    Shakerian, Reza
    MohammadPour, Touraj
    Kamali, Seyed Hossein
    Hedayati, Maysam
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7, 2010, : 28 - 32
  • [30] Two Identity-Based Aggregate Signature Schemes from Pairings
    Sahana, Subhas Chandra
    Das, Sourav Kumar
    Mashahary, Sangeeta
    Bhuyan, Bubu
    [J]. ADVANCES IN COMMUNICATION, DEVICES AND NETWORKING, 2018, 462 : 877 - 884