Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems

被引:21
|
作者
Chen, Jiahui [1 ]
Ling, Jie [1 ]
Ning, Jianting [2 ]
Ding, Jintai [3 ]
机构
[1] Guangdong Univ Technol, Fac Comp, Guangzhou, Guangdong, Peoples R China
[2] Natl Univ Singapore, Sch Comp, Singapore, Singapore
[3] Univ Cincinnati, Cincinnati, OH 45221 USA
来源
COMPUTER JOURNAL | 2019年 / 62卷 / 08期
关键词
ID-based signature; post-quantum cryptography; multivariate public key cryptosystems; key distribution center; UNBALANCED OIL; CRYPTANALYSIS; ALGORITHMS; RAINBOW; SYSTEMS; ATTACK; UOV;
D O I
10.1093/comjnl/bxz013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we proposed an idea to construct a general multivariate public key cryptographic (MPKC) scheme based on a user's identity. In our construction, each user is distributed a unique identity by the key distribution center (KDC) and we use this key to generate user's private keys. Thereafter, we use these private keys to produce the corresponding public key. This method can make key generating process easier so that the public key will reduce from dozens of Kilobyte to several bits. We then use our general scheme to construct practical identity-based signature schemes named ID-UOV and ID-Rainbow based on two well-known and promising MPKC signature schemes, respectively. Finally, we present the security analysis and give experiments for all of our proposed schemes and the baseline schemes. Comparison shows that our schemes are both efficient and practical.
引用
收藏
页码:1132 / 1147
页数:16
相关论文
共 50 条
  • [41] Identity-based key-insulated signature with secure key-updates
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Li, Xiangxue
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 13 - +
  • [42] How to solve key escrow and identity revocation in identity-based encryption schemes
    Oh, J
    Lee, K
    Moon, S
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 290 - 303
  • [43] Analysis and improvements of two identity-based perfect concurrent signature schemes
    Huang, Zhenjie
    Chen, Kefei
    Lin, Xuanzhi
    Huang, Rufen
    INFORMATICA, 2007, 18 (03) : 375 - +
  • [44] Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting
    Chatterjee, Sanjit
    Dimri, Akansha
    Pandit, Tapas
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 387 - 412
  • [45] General Fault Attacks on Multivariate Public Key Cryptosystems
    Hashimoto, Yasufumi
    Takagi, Tsuyoshi
    Sakurai, Kouichi
    POST-QUANTUM CRYPTOGRAPHY, 2011, 7071 : 1 - +
  • [46] Multivariate public key cryptosystems from diophantine equations
    Shuhong Gao
    Raymond Heindl
    Designs, Codes and Cryptography, 2013, 67 : 1 - 18
  • [47] IMPLEMENTING AIRCRAFT IDENTIFICATION SCHEMES BY PUBLIC KEY CRYPTOSYSTEMS
    ARAZI, B
    EKSTEIN, N
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 1982, 18 (03) : 318 - 322
  • [48] General Fault Attacks on Multivariate Public Key Cryptosystems
    Hashimoto, Yasufumi
    Takagi, Tsuyoshi
    Sakurai, Kouichi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 196 - 205
  • [49] Multivariate public key cryptosystems from diophantine equations
    Gao, Shuhong
    Heindl, Raymond
    DESIGNS CODES AND CRYPTOGRAPHY, 2013, 67 (01) : 1 - 18
  • [50] Similar keys of multivariate quadratic public key cryptosystems
    Hu, YH
    Wang, LC
    Chou, CY
    Lai, FP
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 211 - 222