Identity-based signatures in standard model

被引:0
|
作者
Huiyan Chen
Chenchen Zhang
机构
[1] Beijing Electronics Science and Technology Institute,
[2] Xidian University,undefined
来源
Acta Informatica | 2019年 / 56卷
关键词
.;
D O I
暂无
中图分类号
学科分类号
摘要
Tight security proofs allow for shorter security parameters and better efficiency. In this paper, we firstly present a new signature scheme, SSSTR, which is strongly existentially unforgeable under adaptively chosen message attacks and whose security is tightly related to Strong Diffie–Hellman assumption in the standard model, and then give two identity-based signatures which are existentially unforgeable under adaptively chosen message and identity attacks and whose security is also tightly related to Strong Diffie–Hellman assumption in the standard model.
引用
收藏
页码:471 / 486
页数:15
相关论文
共 50 条
  • [31] Identity-Based Sanitizable Signature Scheme in the Standard Model
    Ming, Yang
    Shen, Xiaoqin
    Peng, Yamian
    INFORMATION COMPUTING AND APPLICATIONS, PT 1, 2010, 105 : 9 - +
  • [32] On the Tightness of Deterministic Identity-Based Signatures
    Yanaii, Naoto
    2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 168 - 173
  • [33] Real Hidden Identity-Based Signatures
    Chow, Sherman S. M.
    Zhang, Haibin
    Zhang, Tao
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017, 2017, 10322 : 21 - 38
  • [34] Identity-based Signatures from Lattices
    Zaheri, Mohammad
    Sadeghiyan, Babak
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1114 - 1118
  • [35] The legal classification of identity-based signatures
    Sorge, Christoph
    COMPUTER LAW & SECURITY REVIEW, 2014, 30 (02) : 126 - 136
  • [36] Secure Identity-Based Blind Signature Scheme in the Standard Model
    Hu, Xiao-Ming
    Huang, Shang-Teng
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (01) : 215 - 230
  • [37] Adaptively secure hierarchical identity-based signature in the standard model
    Zhang, Le-You
    Hu, Yu-Pu
    Wu, Qing
    Journal of China Universities of Posts and Telecommunications, 2010, 17 (06): : 95 - 100
  • [39] On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
    Sun, Ying
    Yu, Yong
    Zhang, Xiaosong
    Chai, Jiwen
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (03) : 721 - 723
  • [40] New Identity-Based Identification and Signature Schemes in the Standard Model
    Tan, Syh-Yuan
    Heng, Swee-Huay
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,