A Provably Secure Scalable Revocable Identity-Based Signature Scheme Without Bilinear Pairings

被引:0
|
作者
Wang, Changji [1 ,2 ]
Huang, Hui [3 ]
Yuan, Yuan [4 ]
机构
[1] Guangdong Univ Foreign Studies, Sch Informat Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Shanghai Key Lab Integrated Adm Technol Informat, Shanghai 200240, Peoples R China
[3] Guangdong Univ Finance & Econ, Sch Stat & Math, Guangzhou 510320, Guangdong, Peoples R China
[4] Guangdong Univ Foreign Studies, Sch Math & Stat, Guangzhou 510006, Guangdong, Peoples R China
关键词
Revocable identity-based encryption; Revocable identity-based signature; KUNode algorithm; Random oracle model; ENCRYPTION;
D O I
10.1007/978-3-030-16946-6_47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Revocation functionality is essential for the practical deployment of identity-based cryptosystems because a user's private key may be corrupted by hacking or the period of a contract expires. Many researchers are focusing on revocable identity-based encryption scheme, while revocable identity-based signature scheme has received limited concentration. Recently, several revocable identity-based signature schemes have been proposed. However, these schemes are not scalable and are vulnerable to signing key exposure attack. In this paper, we first refine the security model of revocable identity-based signature scheme by considering the signing key exposure attack. Then, we propose a scalable revocable identity-based signature scheme with signing key exposure resistance. Finally, we prove the proposed scheme is existentially unforgeable against adaptively chosen message and identity attacks under the standard discrete logarithm assumption in the random oracle model.
引用
收藏
页码:588 / 597
页数:10
相关论文
共 50 条
  • [21] Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings
    Qi Yanfeng
    Tang Chunming
    Lou Yu
    Xu Maozhi
    Guo Baoan
    CHINA COMMUNICATIONS, 2013, 10 (11) : 37 - 41
  • [22] Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings
    Reddy, P. Vasudeva
    Babu, A. Ramesh
    Gayathri, N. B.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (10) : 1211 - 1218
  • [23] An efficient and provably secure identity-based signature scheme in the standard model
    Li, Ji-Guo
    Jiang, Ping-Jin
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (11): : 2130 - 2136
  • [24] Identity-based threshold signature scheme from the bilinear pairings (extended abstract)
    Baek, J
    Zheng, YL
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 124 - 128
  • [25] An Identity-Based Proxy Signature from Bilinear Pairings
    Ji, Huifang
    Han, Wenbao
    Zhao, Long
    Wang, Yongjuan
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 14 - 17
  • [26] A VERIFIABLE PROXY SIGNATURE SCHEME BASED ON BILINEAR PAIRINGS WITH IDENTITY-BASED CRYPTOGRAPHIC APPROACHES
    Chang, Ya-Fen
    Tai, Wei-Liang
    Lin, Chung-Yi
    INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01): : 60 - 68
  • [27] Provable secure proxy signature scheme without bilinear pairings
    Tiwari, Namita
    Padhye, Sahadeo
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (05) : 644 - 650
  • [28] A Proxy Ring Signature Scheme with Revocable Anonymity Based on Bilinear Pairings
    Wang, Huaqun
    JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (05): : 627 - 632
  • [29] Provably Secure Key Insulated Attribute Based Signature without Bilinear Pairings for Wireless Communications
    Hong, Han-shu
    Xia, Yun-hao
    Sun, Zhi-xin
    INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND NETWORK ENGINEERING (WCNE 2016), 2016,
  • [30] A New Provably Secure Identity-Based Multi-proxy Signature Scheme
    Chen, Qunshan
    Huang, Zhenjie
    Ding, Yong
    Zhou, Yuping
    Huang, Hui
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 230 - 242