Secure Outsourcing of Two Standard Identity-Based Cryptosystems

被引:0
|
作者
Saeidi, Mohammad Reza [1 ]
Mala, Hamid [1 ]
机构
[1] Univ Isfahan, Fac Comp Engn, Esfahan, Iran
关键词
Checkability; Identity-Based; Encryption; Outsourcing; Security; ALGORITHMS;
D O I
10.22042/isecure.2023.320345.734
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last two decades, bilinear pairings have found many applications in cryptography. Meanwhile, identity-based cryptosystems based on bilinear pairings have received particular attention. The IEEE, IETF, and ISO organizations have been working on standardizing pairing-based cryptographic schemes. The Boneh-Franklin identity-based encryption and Sakai-Kasahara identity-based signature are the most well-known identity-based schemes that have been standardized. So far, researchers have proposed various schemes to reduce the computational overhead of pairing operations. All these schemes are trying to outsource pairing operations securely. However, besides pairing operations, there are other essential and costly operations in pairing-based cryptography and identity-based schemes, including scalar multiplication on elliptic curves. In this research, we outsource the Boneh-Franklin encryption in a more secure and efficient (in terms of computational and communication complexity) way than existing schemes. Also, we outsource the BLMQ signature (based on Sakai-Kasahara) scheme for the first time. The proposed schemes are secure in the OMTUP model. Also, unlike previous schemes, we considered communication channels insecure. Moreover, compared with the trivial solution, which outsources every single operation (such as pairing, scalar multiplication, and modular exponentiation) as a separate subroutine, our schemes offer less complexity by seamlessly outsourcing the whole encryption scheme for the first time.(c) 2020 ISC. All rights reserved.
引用
收藏
页码:216 / 229
页数:14
相关论文
共 50 条
  • [1] Secure identity-based signcryption in the standard model
    Li, Fagen
    Takagi, Tsuyoshi
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (11-12) : 2685 - 2694
  • [2] Domain-based administration of identity-based cryptosystems for secure email and IPSEC
    Smetters, DK
    Durfee, G
    USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, 2003, : 215 - 229
  • [3] Constructing identity-based cryptosystems for discrete logarithm based cryptosystems
    Lee, WB
    Liao, KC
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2004, 27 (04) : 191 - 199
  • [4] Identity-based threshold signature secure in the standard model
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    International Journal of Network Security, 2010, 10 (01) : 75 - 80
  • [5] Efficient identity-based signatures secure in the standard model
    Paterson, Kenneth G.
    Schuldt, Jacob C. N.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 207 - 222
  • [6] Identity-Based Cryptosystems and Quadratic Residuosity
    Joye, Marc
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 225 - 254
  • [7] Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
    Boneh, D
    Katz, J
    TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 87 - 103
  • [9] Secure Identity-Based Blind Signature Scheme in the Standard Model
    Hu, Xiao-Ming
    Huang, Shang-Teng
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (01) : 215 - 230
  • [10] Adaptively secure hierarchical identity-based signature in the standard model
    Zhang, Le-You
    Hu, Yu-Pu
    Wu, Qing
    Journal of China Universities of Posts and Telecommunications, 2010, 17 (06): : 95 - 100