Identity-based signatures in standard model

被引:0
|
作者
Huiyan Chen
Chenchen Zhang
机构
[1] Beijing Electronics Science and Technology Institute,
[2] Xidian University,undefined
来源
Acta Informatica | 2019年 / 56卷
关键词
.;
D O I
暂无
中图分类号
学科分类号
摘要
Tight security proofs allow for shorter security parameters and better efficiency. In this paper, we firstly present a new signature scheme, SSSTR, which is strongly existentially unforgeable under adaptively chosen message attacks and whose security is tightly related to Strong Diffie–Hellman assumption in the standard model, and then give two identity-based signatures which are existentially unforgeable under adaptively chosen message and identity attacks and whose security is also tightly related to Strong Diffie–Hellman assumption in the standard model.
引用
收藏
页码:471 / 486
页数:15
相关论文
共 50 条
  • [21] Fuzzy Biometric identity-based signature in the standard model
    Zhang Leyou
    Wu Qing
    Hu Yupu
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE, PTS 1-4, 2011, 44-47 : 3350 - +
  • [22] Analysis of an Identity-Based Signcryption Scheme in the Standard Model
    Li, Fagen
    Liao, Yongjian
    Qin, Zhiguang
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 268 - 269
  • [23] Correction to: Fuzzy Identity-Based Signature in Standard Model
    Yunyun Qu
    Jiwen Zeng
    Wireless Personal Communications, 2022, 125 (1) : 99 - 99
  • [24] Revocable identity-based matchmaking encryption in the standard model
    Jiang, Zhe
    Wang, Xiwen
    Zhang, Kai
    Gong, Junqing
    Chen, Jie
    Qian, Haifeng
    IET INFORMATION SECURITY, 2023, 17 (04) : 567 - 581
  • [25] Novel identity-based broadcast encryption in the standard model
    Zhang, Leyou
    Xu, Zhiqin
    ICIC Express Letters, Part B: Applications, 2013, 4 (03): : 663 - 669
  • [26] New identity-based ring signature in the standard model
    Applied Mathematics Department, Xidian University, Xi'an 710071, China
    不详
    Dianzi Yu Xinxi Xuebao, 2009, 7 (1727-1731): : 1727 - 1731
  • [27] A new Hierarchical identity-based encryption in the standard model
    Zhang, Le-You
    Hu, Yu-Pu
    Wu, Qing
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (04): : 937 - 941
  • [28] Identity-based threshold signature secure in the standard model
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    International Journal of Network Security, 2010, 10 (01) : 75 - 80
  • [29] Unbounded Hierarchical Identity-based Encryption in the Standard Model
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    Yang, Yang
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (01): : 105 - 112
  • [30] New Fuzzy Identity-Based Encryption in the Standard Model
    Ren, Yanli
    Gu, Dawu
    Wang, Shuozhong
    Zhang, Xinpeng
    INFORMATICA, 2010, 21 (03) : 393 - 407