Efficient Revocable ID-Based Signature With Cloud Revocation Server

被引:20
|
作者
Jia, Xiaoying [1 ]
He, Debiao [2 ,3 ]
Zeadally, Sherali [4 ]
Li, Li [5 ]
机构
[1] South Cent Univ Nationalities, Sch Math & Stat, Wuhan 430074, Peoples R China
[2] Wuhan Univ, Sch Comp, State Key Lab Software Engn, Wuhan 430072, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Gulin 541000, Peoples R China
[4] Univ Kentucky, Coll Commun & Informat, Lexington, KY 40506 USA
[5] Wuhan Univ, Int Sch Software, Wuhan 430072, Peoples R China
来源
IEEE ACCESS | 2017年 / 5卷
基金
中国国家自然科学基金;
关键词
Identity-based signature; revocation; cloud computing; outsourcing; ENCRYPTION;
D O I
10.1109/ACCESS.2017.2676021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will increase quickly when the number of users increases. In this paper, we propose an efficient revocable identity-based signature (RIBS) scheme in which the revocation functionality is outsourced to a cloud revocation server (CRS). In our proposed approach, most of the computations needed during key-updates are offloaded to the CRS. We describe the new framework and the security model for the RIBS scheme with CRS and we prove that the proposed scheme is existentially unforgeable against adaptively chosen messages and identity attacks in the random oracle model. Furthermore, we monstrate that our scheme outperforms previous IBS schemes in terms of lower computation and communication costs.
引用
收藏
页码:2945 / 2954
页数:10
相关论文
共 50 条
  • [1] Efficient revocable ID-based encryption with cloud revocation server
    Jia, Xiaoying
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (01)
  • [2] A Secure and Efficient ID-Based Signature Scheme with Revocation for IOT Deployment
    Yang, Xiaodong
    Wang, Jinli
    Ma, Tingchun
    Chen, Chunlin
    Wang, Caifen
    [J]. 2018 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2018, : 202 - 207
  • [3] Leakage Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server
    Tseng, Yuh-Min
    Wu, Jui-Di
    Huang, Sen-Shan
    Tsai, Tung-Tso
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2020, 49 (04): : 464 - 481
  • [4] Provably secure revocable ID-based signature in the standard model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (10) : 1250 - 1260
  • [5] Revocable ID-Based Signature with Short Size over Lattices
    Hung, Ying-Hao
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017, : 1 - 9
  • [6] Efficient Revocable ID-Based Encryption with a Public Channel
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    [J]. COMPUTER JOURNAL, 2012, 55 (04): : 475 - 486
  • [7] Strongly Secure Revocable ID-based Signature without Random Oracles
    Hung, Ying-Hao
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (03): : 264 - 276
  • [8] A Remark on "Efficient Revocable ID-Based Encryption with a Public Channel"
    Seo, Jae Hong
    Emura, Keita
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (11) : 2282 - 2285
  • [9] Efficient Revocable Multi-Receiver ID-Based Encryption
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 159 - 169
  • [10] Efficient ID-based blind signature schemes
    Ming, Yang
    Wang, Yumin
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 260 - 264