Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems

被引:21
|
作者
Chen, Jiahui [1 ]
Ling, Jie [1 ]
Ning, Jianting [2 ]
Ding, Jintai [3 ]
机构
[1] Guangdong Univ Technol, Fac Comp, Guangzhou, Guangdong, Peoples R China
[2] Natl Univ Singapore, Sch Comp, Singapore, Singapore
[3] Univ Cincinnati, Cincinnati, OH 45221 USA
来源
COMPUTER JOURNAL | 2019年 / 62卷 / 08期
关键词
ID-based signature; post-quantum cryptography; multivariate public key cryptosystems; key distribution center; UNBALANCED OIL; CRYPTANALYSIS; ALGORITHMS; RAINBOW; SYSTEMS; ATTACK; UOV;
D O I
10.1093/comjnl/bxz013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we proposed an idea to construct a general multivariate public key cryptographic (MPKC) scheme based on a user's identity. In our construction, each user is distributed a unique identity by the key distribution center (KDC) and we use this key to generate user's private keys. Thereafter, we use these private keys to produce the corresponding public key. This method can make key generating process easier so that the public key will reduce from dozens of Kilobyte to several bits. We then use our general scheme to construct practical identity-based signature schemes named ID-UOV and ID-Rainbow based on two well-known and promising MPKC signature schemes, respectively. Finally, we present the security analysis and give experiments for all of our proposed schemes and the baseline schemes. Comparison shows that our schemes are both efficient and practical.
引用
收藏
页码:1132 / 1147
页数:16
相关论文
共 50 条
  • [21] IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE
    Wan Zhongmei Lai Xuejia Weng Jian Liu Shengli Hong Xuan (Department of Computer Science and Engineering
    Journal of Electronics(China), 2009, 26 (06) : 853 - 858
  • [22] Identity-Based Cryptosystems and Quadratic Residuosity
    Joye, Marc
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 225 - 254
  • [23] Short (identity-based) strong designated verifier signature schemes
    Huang, Xinyi
    Susilo, Willy
    Mu, Yi
    Zhang, Futai
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 214 - 225
  • [24] Two Identity-Based Aggregate Signature Schemes from Pairings
    Sahana, Subhas Chandra
    Das, Sourav Kumar
    Mashahary, Sangeeta
    Bhuyan, Bubu
    ADVANCES IN COMMUNICATION, DEVICES AND NETWORKING, 2018, 462 : 877 - 884
  • [25] Security analysis of batch verification on identity-based signature schemes
    Chiang, Han-Fei
    Yen, Sung-Ming
    Lin, Hsi-Chung
    PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4, 2007, : 50 - +
  • [26] New Identity-Based Identification and Signature Schemes in the Standard Model
    Tan, Syh-Yuan
    Heng, Swee-Huay
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [27] On the General Construction of Tightly Secure Identity-Based Signature Schemes
    Wu, Ge
    Zhao, Zhen
    Guo, Fuchun
    Susilo, Willy
    Zhang, Futai
    COMPUTER JOURNAL, 2020, 63 (12): : 1835 - 1848
  • [28] Efficient identity-based strong designated verifier signature schemes
    Duan, Meijiao
    Xu, Jing
    Feng, Dengguo
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (07) : 902 - 911
  • [29] Identity-based cryptography in public key management
    Yum, DH
    Lee, PJ
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 71 - 84
  • [30] Two new identity-based threshold ring signature schemes
    Deng, Lunzhi
    Zeng, Jiwen
    THEORETICAL COMPUTER SCIENCE, 2014, 535 : 38 - 45