Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems

被引:21
|
作者
Chen, Jiahui [1 ]
Ling, Jie [1 ]
Ning, Jianting [2 ]
Ding, Jintai [3 ]
机构
[1] Guangdong Univ Technol, Fac Comp, Guangzhou, Guangdong, Peoples R China
[2] Natl Univ Singapore, Sch Comp, Singapore, Singapore
[3] Univ Cincinnati, Cincinnati, OH 45221 USA
来源
COMPUTER JOURNAL | 2019年 / 62卷 / 08期
关键词
ID-based signature; post-quantum cryptography; multivariate public key cryptosystems; key distribution center; UNBALANCED OIL; CRYPTANALYSIS; ALGORITHMS; RAINBOW; SYSTEMS; ATTACK; UOV;
D O I
10.1093/comjnl/bxz013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we proposed an idea to construct a general multivariate public key cryptographic (MPKC) scheme based on a user's identity. In our construction, each user is distributed a unique identity by the key distribution center (KDC) and we use this key to generate user's private keys. Thereafter, we use these private keys to produce the corresponding public key. This method can make key generating process easier so that the public key will reduce from dozens of Kilobyte to several bits. We then use our general scheme to construct practical identity-based signature schemes named ID-UOV and ID-Rainbow based on two well-known and promising MPKC signature schemes, respectively. Finally, we present the security analysis and give experiments for all of our proposed schemes and the baseline schemes. Comparison shows that our schemes are both efficient and practical.
引用
收藏
页码:1132 / 1147
页数:16
相关论文
共 50 条
  • [31] Identity-Based Aggregate and Multi-Signature Schemes Based on RSA
    Bagherzandi, Ali
    Jarecki, Stanislaw
    PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 480 - 498
  • [32] Public-Key Cryptosystems and Signature Schemes from p-Adic Lattices
    Deng, Yingpu
    Luo, Lixia
    Pan, Yanbin
    Wang, Zhaonan
    Xiao, Guanju
    P-ADIC NUMBERS ULTRAMETRIC ANALYSIS AND APPLICATIONS, 2024, 16 (01) : 23 - 42
  • [33] On the Differential Security of Multivariate Public Key Cryptosystems
    Smith-Tone, Daniel
    POST-QUANTUM CRYPTOGRAPHY, 2011, 7071 : 130 - 142
  • [34] Cryptanalysis of Rational Multivariate Public Key Cryptosystems
    Ding, Jintai
    Wagner, John
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2008, 5299 : 124 - 136
  • [35] Collusion attack free identity-based cryptosystems
    Tanaka, H
    ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, : 411 - 411
  • [36] A new framework for implementing identity-based cryptosystems
    Siad, A.
    Amara, M.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 118 : 36 - 48
  • [37] Dealerless Corporate Key Generation for Identity-Based Encryption Schemes
    Liu, Zhen
    Wong, Duncan S.
    Poon, Jack
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 211 - 222
  • [38] Identity-based universal designated multi-verifiers signature schemes
    Seo, Seung-Hyun
    Hwang, Jung Yeon
    Choi, Kyu Young
    Lee, Dong Hoon
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (05) : 288 - 295
  • [39] Feasibility analysis of two identity-based proxy ring signature schemes
    Wang, Huaqun
    Zhang, Lijun
    Zhao, Junxi
    High Technology Letters, 2007, 13 (02) : 207 - 209
  • [40] Creation of identity-based digital signature schemes from bilinear maps
    A. A. Kulaga
    Cybernetics and Systems Analysis, 2012, 48 (3) : 452 - 458