On the General Construction of Tightly Secure Identity-Based Signature Schemes

被引:2
|
作者
Wu, Ge [1 ,2 ,4 ]
Zhao, Zhen [3 ,4 ]
Guo, Fuchun [4 ]
Susilo, Willy [4 ]
Zhang, Futai [5 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, 2 Southeast Univ Rd, Nanjing 211189, Jiangsu, Peoples R China
[2] Purple Mt Labs, 9 East Mozhou Rd, Nanjing 211111, Jiangsu, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Networks, 2 South Taibai Rd, Xian 710071, Shaanxi, Peoples R China
[4] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Northfield Ave, Wollongong, NSW 2522, Australia
[5] Nanjing Normal Univ, Sch Comp Sci & Technol, 1 Wenyuan Rd, Nanjing 210023, Jiangsu, Peoples R China
来源
COMPUTER JOURNAL | 2020年 / 63卷 / 12期
基金
中国国家自然科学基金;
关键词
general construction; identity-based signature; tight security;
D O I
10.1093/comjnl/bxaa011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A tightly secure scheme has a reduction, where the reduction loss is a small constant. Identity-based signature (IBS) is an important cryptographic primitive, and tightly secure IBS schemes enjoy the advantage that the security parameter can be optimal to achieve a certain security level. General constructions of IBS schemes (Bellare, M., Namprempre, C., and Neven, G. (2004) Security Proofs for Identity-Based Identification and Signature Schemes. In Proc. EUROCRYPT 2004, May 2-6, pp. 268-286. Springer, Berlin, Interlaken, Switzerland; Galindo, D., Herranz, J., and Kiltz, E. (2006) On the Generic Construction of Identity-Based Signatures With Additional Properties. In Proceedings of ASIACRYPT 2006, December 3-7, pp. 178-193. Springer, Berlin, Shanghai, China) and their security have been extensively studied. However, the security is not tight and how to generally construct a tightly secure IBS scheme remains unknown. In this paper, we concentrate on the general constructions of IBS schemes. We first take an insight into previous constructions and analyze the reason why it cannot achieve tight security. To further study possible tightly secure constructions, we propose another general construction, which could be seen as a different framework of IBS schemes. Our construction requires two traditional signature schemes, whereas the construction by Bellare et al. uses one scheme in a two-round iteration. There are no additional operations in our general construction. Its main advantage is providing the possibility of achieving tight security for IBS schemes in the random oracle model. Combining two known signature schemes, we present an efficient IBS scheme with tight security as an example.
引用
收藏
页码:1835 / 1848
页数:14
相关论文
共 50 条
  • [1] A Tightly Secure Identity-Based Signature Scheme from Isogenies
    Chen, Jiawei
    Jo, Hyungrok
    Sato, Shingo
    Shikata, Junji
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 141 - 163
  • [2] Tightly Secure Identity-Based Multisignatures
    Yanai, Naoto
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2017,
  • [3] Tightly Secure Hierarchical Identity-Based Encryption
    Langrehr, Roman
    Pan, Jiaxin
    [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1787 - 1821
  • [4] Tightly Secure Hierarchical Identity-Based Encryption
    Roman Langrehr
    Jiaxin Pan
    [J]. Journal of Cryptology, 2020, 33 : 1787 - 1821
  • [5] Efficient Generic Construction of Forward-Secure Identity-Based Signature
    Al Ebri, Noura
    Baek, Joonsang
    Shoufan, Abdulhadi
    Quang Hieu Vu
    [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 55 - 64
  • [6] Forward-secure identity-based signature: Security notions and construction
    Yu, Jia
    Hao, Rong
    Kong, Fanyu
    Cheng, Xiangguo
    Fan, Jianxi
    Chen, Yangkui
    [J]. INFORMATION SCIENCES, 2011, 181 (03) : 648 - 660
  • [7] General construction of revocable identity-based fully homomorphic signature
    Xie, Congge
    Weng, Jian
    Lu, Wei
    Hou, Lin
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (03)
  • [8] General construction of revocable identity-based fully homomorphic signature
    Congge Xie
    Jian Weng
    Wei Lu
    Lin Hou
    [J]. Science China Information Sciences, 2020, 63
  • [9] Provably Secure Identity-Based Identification and Signature Schemes with Parallel-PVR
    Song, Bo
    Zhao, Yiming
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 227 - 238
  • [10] Provably secure identity-based identification and signature schemes from code assumptions
    Song, Bo
    Zhao, Yiming
    [J]. PLOS ONE, 2017, 12 (08):