New Constructions of Hierarchical Identity-Based Signature in the Standard Model

被引:0
|
作者
Wu Qing [1 ]
Sun Suxia [1 ]
机构
[1] Xian Inst Posts & Telecommun, Sch Automat, Xian, Peoples R China
关键词
Hierarchical Identity-Based Signature; Hierarchical Identity-Based Encryption; Provable Security; CDH Assumption; h-CDH assumption; ENCRYPTION; HIBE;
D O I
10.4028/www.scientific.net/KEM.474-476.1356
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, a new construct of hierarchical identity-based signature(HIBS) scheme is proposed at first. It has many advantages over those available, such as fully secure without using random oracles, efficient signing algorithm. Additionally, it is provably secure under the computational Diffie-Hellman(CDH) assumption. This assumption is more natural than many of the hardness assumptions recently introduced to HIBS in the standard model. However, the length of its private key and signature increases as the hierarchy depth expands. Then a modified scheme is presented. The signature of modified scheme consists of three group elements and the private keys size shrinks as the identity depth increases. Under the h-CDH assumption, it is provable security in full security model without using random oracles.
引用
收藏
页码:1356 / 1361
页数:6
相关论文
共 50 条
  • [21] Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model
    He, Debiao
    Zhang, Mingwu
    Xu, Baowen
    COMPUTER JOURNAL, 2015, 58 (10): : 2507 - 2508
  • [22] An improved efficient identity-based proxy signature in the standard model
    Hu, XiaoMing
    Wang, Jian
    Xu, HuaJie
    Yang, YinChun
    Xu, XiaoLin
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (01) : 22 - 38
  • [23] PRACTICAL HIERARCHICAL IDENTITY BASED SIGNATURE IN THE STANDARD MODEL
    Cui Wei
    Xin Yang
    Yang Yi-xian
    Niu Xin-xin
    2008 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS AND SIGNAL PROCESSING, VOLS 1 AND 2, 2007, : 416 - 421
  • [24] Adaptively secure hierarchical identity-based encryption in the standard model
    Wu, Qing
    ICIC Express Letters, 2011, 5 (4 B): : 1321 - 1326
  • [25] Hierarchical Identity-Based Signature in Polynomial Rings
    Yang, Zhichao
    Duong, Dung H.
    Susilo, Willy
    Yang, Guomin
    Li, Chao
    Chen, Rongmao
    COMPUTER JOURNAL, 2020, 63 (10): : 1490 - 1499
  • [26] A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model
    Yang, Chunli
    Zheng, Shihui
    Wang, Licheng
    Tian, Miaomiao
    Gu, Lize
    Yang, Yixian
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [27] An Identity-Based Proxy Signature Scheme from Lattices in the Standard Model
    Li, Wang
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 167 - 172
  • [28] Identity-based partially blind signature in the standard model for electronic cash
    Li, Fagen
    Zhang, Mingwu
    Takagi, Tsuyoshi
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 196 - 203
  • [29] Identity-based Convertible Limited Verifier Signature Scheme in the Standard Model
    Shen Xiaoqin
    Ming Yang
    MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, PTS 1 AND 2, 2011, 48-49 : 599 - +
  • [30] Identity-based signature scheme with partial message recovery in the standard model
    Liu, Zhen-Hua
    Zhang, Xiang-Song
    Tian, Xu-An
    Hu, Yu-Pu
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 654 - 658