Security Proofs for Identity-Based Identification and Signature Schemes

被引:130
|
作者
Bellare, Mihir [1 ]
Namprempre, Chanathip
Neven, Gregory
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
基金
美国国家科学基金会;
关键词
Identity-based cryptography; Identification schemes; Signatures; Security proofs; DIGITAL SIGNATURE; ENCRYPTION;
D O I
10.1007/s00145-008-9028-8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper provides either security proofs or attacks for a large number of identity-based identification and signature schemes defined either explicitly or implicitly in existing literature. Underlying these is a framework that on the one hand helps explain how these schemes are derived and on the other hand enables modular security analyses, thereby helping to understand, simplify, and unify previous work. We also analyze a generic folklore construction that in particular yields identity-based identification and signature schemes without random oracles.
引用
收藏
页码:1 / 61
页数:61
相关论文
共 50 条
  • [1] Security Proofs for Identity-Based Identification and Signature Schemes
    Mihir Bellare
    Chanathip Namprempre
    Gregory Neven
    [J]. Journal of Cryptology, 2009, 22 : 1 - 61
  • [2] Security proofs for identity-based identification and signature schemes
    Bellare, M
    Namprempre, C
    Neven, G
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 268 - 286
  • [3] On the security of two identity-based signature schemes based on pairings
    Qin, Zhen
    Yuan, Chen
    Wang, Yilei
    Xiong, Hu
    [J]. INFORMATION PROCESSING LETTERS, 2016, 116 (06) : 416 - 418
  • [4] Security analysis of batch verification on identity-based signature schemes
    Chiang, Han-Fei
    Yen, Sung-Ming
    Lin, Hsi-Chung
    [J]. PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4, 2007, : 50 - +
  • [5] New Identity-Based Identification and Signature Schemes in the Standard Model
    Tan, Syh-Yuan
    Heng, Swee-Huay
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [6] On the security of an identity-based signature scheme
    [J]. Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):
  • [7] Security proofs for signature schemes
    Pointcheval, D
    Stern, J
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 387 - 398
  • [8] New identity-based ring signature schemes
    Herranz, J
    Sáez, G
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 27 - 39
  • [9] Identity-based threshold signature and mediated proxy signature schemes
    YU Yong YANG Bo State Key Laboratory of ISN
    [J]. The Journal of China Universities of Posts and Telecommunications, 2007, (02) : 69 - 74
  • [10] Hierarchical Identity-Based Identification Schemes
    Chin, Ji-Jian
    Heng, Swee-Huay
    Goi, Bok-Min
    [J]. SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 93 - +