Identity-based partial message recovery signatures (or how to shorten ID-based signatures)

被引:0
|
作者
Zhang, FG [1 ]
Susilo, W
Mu, Y
机构
[1] Sun Yat Sen Univ, Dept Elect & Commun Engn, Guangzhou 510275, Peoples R China
[2] Univ Wollongong, Sch Informat Technol & Comp Sci, Wollongong, NSW 2500, Australia
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new notion of short identity-based signature scheme. We argue that the identity-based environment is essential in some scenarios. The notion of short identity-based signature schemes can be viewed as identity-based (partial) message recovery signatures. Signature schemes with message recovery has been extensively studied in the literature. This problem is somewhat related to the problem of signing short messages using a scheme that minimizes the total length of the original message and the appended signature. In this paper, firstly, we revisit this notion and propose an identity-based message recovery signature scheme. Our scheme can be regarded as the identity based version of Abe-Okamoto's scheme [1]. Then, we extend our scheme to achieve an identity-based partial message recovery signature scheme. In this scheme, the signature is appended to a truncated message and the discarded bytes are recovered by the verification algorithm. This is to answer the limitation of signature schemes with message recovery that usually deal with messages of fixed length. This paper opens a new research area, namely how to shorten identity based signatures, in contrast to proposing a short signature scheme. We present this novel notion together with two concrete schemes based on bilinear pairings.
引用
收藏
页码:45 / 56
页数:12
相关论文
共 50 条
  • [1] Efficient ID-based digital signatures with message recovery
    Tso, Raylin
    Gu, Chunxiang
    Okamoto, Takeshi
    Okamoto, Eiji
    CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 47 - +
  • [2] Secret handshakes from ID-based message recovery signatures: A new generic approach
    Wen, Yamin
    Zhang, Fangguo
    Xu, Lingling
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (01) : 96 - 104
  • [3] Deterministic identity-based signatures for partial aggregation
    Herranz, J
    COMPUTER JOURNAL, 2006, 49 (03): : 322 - 330
  • [4] Identity-based signatures
    Kiltz, Eike
    Neven, Gregory
    Cryptology and Information Security Series, 2009, 2 : 31 - 44
  • [5] Batch verifications with ID-based signatures
    Yoon, HJ
    Cheon, JH
    Kim, Y
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2004, 2004, 3506 : 233 - 248
  • [6] ID-based ring proxy signatures
    Wei, Baodian
    Zhang, Fangguo
    Chen, Xiaofeng
    2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 1031 - +
  • [7] Generalized ID-based ElGamal signatures
    Kalkan, Said
    Kaya, Kamer
    Selcuk, Ali Aydin
    2007 22ND INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2007, : 328 - 333
  • [8] Efficient identity-based signatures and blind signatures
    Huang, ZJ
    Chen, KF
    Wang, YM
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 120 - 133
  • [9] Hidden identity-based signatures
    Kiayias, A.
    Zhou, H. -S.
    IET INFORMATION SECURITY, 2009, 3 (03) : 119 - 127
  • [10] Identity-based aggregate signatures
    Gentry, Craig
    Ramzan, Zulfikar
    PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 257 - 273