A Provably Secure Scalable Revocable Identity-Based Signature Scheme Without Bilinear Pairings

被引:0
|
作者
Wang, Changji [1 ,2 ]
Huang, Hui [3 ]
Yuan, Yuan [4 ]
机构
[1] Guangdong Univ Foreign Studies, Sch Informat Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Shanghai Key Lab Integrated Adm Technol Informat, Shanghai 200240, Peoples R China
[3] Guangdong Univ Finance & Econ, Sch Stat & Math, Guangzhou 510320, Guangdong, Peoples R China
[4] Guangdong Univ Foreign Studies, Sch Math & Stat, Guangzhou 510006, Guangdong, Peoples R China
关键词
Revocable identity-based encryption; Revocable identity-based signature; KUNode algorithm; Random oracle model; ENCRYPTION;
D O I
10.1007/978-3-030-16946-6_47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Revocation functionality is essential for the practical deployment of identity-based cryptosystems because a user's private key may be corrupted by hacking or the period of a contract expires. Many researchers are focusing on revocable identity-based encryption scheme, while revocable identity-based signature scheme has received limited concentration. Recently, several revocable identity-based signature schemes have been proposed. However, these schemes are not scalable and are vulnerable to signing key exposure attack. In this paper, we first refine the security model of revocable identity-based signature scheme by considering the signing key exposure attack. Then, we propose a scalable revocable identity-based signature scheme with signing key exposure resistance. Finally, we prove the proposed scheme is existentially unforgeable against adaptively chosen message and identity attacks under the standard discrete logarithm assumption in the random oracle model.
引用
收藏
页码:588 / 597
页数:10
相关论文
共 50 条
  • [1] A Provably-Secure Outsourced Revocable Certificateless Signature Scheme Without Bilinear Pairings
    Du, Hongzhen
    Wen, Qiaoyan
    Zhang, Shanshan
    IEEE ACCESS, 2018, 6 : 73846 - 73855
  • [2] Efficient Pairing-Free Provably Secure Scalable Revocable Identity-Based Signature Scheme
    Wang, Chang-Ji
    Huang, Hui
    Yuan, Yuan
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 503 - 509
  • [3] A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings
    Islam, S. K. Hafizul
    Biswas, G. P.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2014, 26 (01) : 55 - 67
  • [4] Identity-Based Directed Signature Scheme without Bilinear Pairings
    Rao, R. R. V. Krishna
    Gayathri, N. B.
    Reddy, P. Vasudeva
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (02): : 335 - 353
  • [5] An efficient identity-based blind signature scheme without bilinear pairings
    He, Debiao
    Chen, Jianhua
    Zhang, Rui
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (04) : 444 - 450
  • [6] An Efficient Fuzzy Identity-based Signature Scheme without Bilinear Pairings
    Wang, Changji
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 440 - 444
  • [7] An efficient and provably-secure certificateless signature scheme without bilinear pairings
    He, D.
    Chen, J.
    Zhang, R.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (11) : 1432 - 1442
  • [8] A Provably Secure Certificate-based Signature Scheme with Bilinear Pairings
    Zhang Jianhong
    Chen Hua
    Yang Yixian
    ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 1271 - +
  • [9] An identity-based ring signature scheme from bilinear pairings
    Lin, CY
    Wu, TC
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 182 - 185
  • [10] A PROVABLY SECURE PROXY SIGNATURE SCHEME FROM BILINEAR PAIRINGS
    Wang Aiqin Li Jiguo Wang Zhijian (College of Computer & Information Engineering
    JournalofElectronics(China), 2010, 27 (03) : 298 - 304