Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems

被引:21
|
作者
Chen, Jiahui [1 ]
Ling, Jie [1 ]
Ning, Jianting [2 ]
Ding, Jintai [3 ]
机构
[1] Guangdong Univ Technol, Fac Comp, Guangzhou, Guangdong, Peoples R China
[2] Natl Univ Singapore, Sch Comp, Singapore, Singapore
[3] Univ Cincinnati, Cincinnati, OH 45221 USA
来源
COMPUTER JOURNAL | 2019年 / 62卷 / 08期
关键词
ID-based signature; post-quantum cryptography; multivariate public key cryptosystems; key distribution center; UNBALANCED OIL; CRYPTANALYSIS; ALGORITHMS; RAINBOW; SYSTEMS; ATTACK; UOV;
D O I
10.1093/comjnl/bxz013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we proposed an idea to construct a general multivariate public key cryptographic (MPKC) scheme based on a user's identity. In our construction, each user is distributed a unique identity by the key distribution center (KDC) and we use this key to generate user's private keys. Thereafter, we use these private keys to produce the corresponding public key. This method can make key generating process easier so that the public key will reduce from dozens of Kilobyte to several bits. We then use our general scheme to construct practical identity-based signature schemes named ID-UOV and ID-Rainbow based on two well-known and promising MPKC signature schemes, respectively. Finally, we present the security analysis and give experiments for all of our proposed schemes and the baseline schemes. Comparison shows that our schemes are both efficient and practical.
引用
收藏
页码:1132 / 1147
页数:16
相关论文
共 50 条
  • [1] Combined schemes for signature and encryption: The public-key and the identity-based setting
    Gonzalez Vasco, Maria Isabel
    Hess, Florian
    Steinwandt, Rainer
    INFORMATION AND COMPUTATION, 2016, 247 : 1 - 10
  • [2] Ring signature scheme based on multivariate public key cryptosystems
    Wang, Shangping
    Ma, Rui
    Zhang, Yaling
    Wang, Xiaofeng
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 62 (10) : 3973 - 3979
  • [3] Threshold key issuing in identity-based cryptosystems
    Gangishetti, Raju
    Gorantla, M. Choudary
    Das, Manik Lal
    Saxena, Ashutosh
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 260 - 264
  • [4] Mediated Hierarchical Identity-Based Combined Public Key Schemes
    Wang, Pingjian
    Lin, Jingqiang
    Jing, Jiwu
    Xie, Yongquan
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 614 - 618
  • [5] New identity-based ring signature schemes
    Herranz, J
    Sáez, G
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 27 - 39
  • [6] Efficient identity-based public-key quantum signature scheme
    Xin, Xiangjun
    Wang, Zhuo
    Yang, Qinglan
    Li, Fagen
    INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2020, 34 (10):
  • [7] Identity-based threshold signature and mediated proxy signature schemes
    YU Yong YANG Bo State Key Laboratory of ISN
    The Journal of China Universities of Posts and Telecommunications, 2007, (02) : 69 - 74
  • [8] Interdomain Identity-Based Key Agreement Schemes
    Fan, Chun-I
    Lin, Yi-Hui
    Hsu, Tuan-Hung
    Hsu, Ruei-Hau
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [9] Strong Identity-Based Proxy Signature Schemes, Revisited
    Liu, Weiwei
    Mu, Yi
    Yang, Guomin
    Tian, Yangguang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [10] Security Proofs for Identity-Based Identification and Signature Schemes
    Bellare, Mihir
    Namprempre, Chanathip
    Neven, Gregory
    JOURNAL OF CRYPTOLOGY, 2009, 22 (01) : 1 - 61