Identity-based signatures in standard model

被引:0
|
作者
Huiyan Chen
Chenchen Zhang
机构
[1] Beijing Electronics Science and Technology Institute,
[2] Xidian University,undefined
来源
Acta Informatica | 2019年 / 56卷
关键词
.;
D O I
暂无
中图分类号
学科分类号
摘要
Tight security proofs allow for shorter security parameters and better efficiency. In this paper, we firstly present a new signature scheme, SSSTR, which is strongly existentially unforgeable under adaptively chosen message attacks and whose security is tightly related to Strong Diffie–Hellman assumption in the standard model, and then give two identity-based signatures which are existentially unforgeable under adaptively chosen message and identity attacks and whose security is also tightly related to Strong Diffie–Hellman assumption in the standard model.
引用
收藏
页码:471 / 486
页数:15
相关论文
共 50 条
  • [41] New Constructions of Hierarchical Identity-Based Signature in the Standard Model
    Wu Qing
    Sun Suxia
    ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1356 - 1361
  • [42] k-resilient identity-based encryption in the standard model
    Heng, SH
    Kurosawa, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01) : 39 - 46
  • [43] Identity-based ring signature scheme under standard model
    Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China
    Tongxin Xuebao, 2008, 4 (40-44):
  • [44] Adaptively secure hierarchical identity-based encryption in the standard model
    Wu, Qing
    ICIC Express Letters, 2011, 5 (4 B): : 1321 - 1326
  • [45] An improved efficient identity-based proxy signature in the standard model
    Hu, XiaoMing
    Wang, Jian
    Xu, HuaJie
    Yang, YinChun
    Xu, XiaoLin
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (01) : 22 - 38
  • [46] Identity-based authenticated key agreement protocols in the standard model
    Ren, Yongjun
    Wang, Jiandong
    Wang, Jian
    Xu, Dazhuan
    Zhuang, Yi
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (09): : 1604 - 1610
  • [47] k-resilient identity-based encryption in the standard model
    Heng, SH
    Kurosawa, K
    TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 67 - 80
  • [48] Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model
    He, Debiao
    Zhang, Mingwu
    Xu, Baowen
    COMPUTER JOURNAL, 2015, 58 (10): : 2507 - 2508
  • [49] Further improvement of an identity-based signcryption scheme in the standard model
    Li, Fagen
    Liao, Yongjian
    Qin, Zhiguang
    Takagi, Tsuyoshi
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (02) : 413 - 421
  • [50] Identity-Based Threshold Signatures from Isogenies
    Atapoor, Shahla
    CRYPTOGRAPHY AND CODING, IMACC 2023, 2024, 14421 : 220 - 240