A Provably Secure Scalable Revocable Identity-Based Signature Scheme Without Bilinear Pairings

被引:0
|
作者
Wang, Changji [1 ,2 ]
Huang, Hui [3 ]
Yuan, Yuan [4 ]
机构
[1] Guangdong Univ Foreign Studies, Sch Informat Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Shanghai Key Lab Integrated Adm Technol Informat, Shanghai 200240, Peoples R China
[3] Guangdong Univ Finance & Econ, Sch Stat & Math, Guangzhou 510320, Guangdong, Peoples R China
[4] Guangdong Univ Foreign Studies, Sch Math & Stat, Guangzhou 510006, Guangdong, Peoples R China
关键词
Revocable identity-based encryption; Revocable identity-based signature; KUNode algorithm; Random oracle model; ENCRYPTION;
D O I
10.1007/978-3-030-16946-6_47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Revocation functionality is essential for the practical deployment of identity-based cryptosystems because a user's private key may be corrupted by hacking or the period of a contract expires. Many researchers are focusing on revocable identity-based encryption scheme, while revocable identity-based signature scheme has received limited concentration. Recently, several revocable identity-based signature schemes have been proposed. However, these schemes are not scalable and are vulnerable to signing key exposure attack. In this paper, we first refine the security model of revocable identity-based signature scheme by considering the signing key exposure attack. Then, we propose a scalable revocable identity-based signature scheme with signing key exposure resistance. Finally, we prove the proposed scheme is existentially unforgeable against adaptively chosen message and identity attacks under the standard discrete logarithm assumption in the random oracle model.
引用
收藏
页码:588 / 597
页数:10
相关论文
共 50 条
  • [31] An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    COMPUTER JOURNAL, 2015, 58 (04): : 1021 - 1039
  • [32] A novel and provably secure identity-based blind signature scheme for online transactions
    Kumar, Sunil
    Mittal, Gaurav
    Yadav, Arvind
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2025, 50 (02):
  • [33] Efficient identity-based threshold signature scheme from bilinear pairings in standard model
    Li, Fei
    Gao, Wei
    Wang, Guilin
    Chen, Kefei
    Wang, Xueli
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2014, 8 (2-3) : 107 - 115
  • [34] Efficient and provably-secure certificateless short signature scheme from bilinear pairings
    Du, Hongzhen
    Wen, Qiaoyan
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 390 - 394
  • [35] An identity-based strongly unforgeable signature without random oracles from bilinear pairings
    Kwon, Saeran
    INFORMATION SCIENCES, 2014, 276 : 1 - 9
  • [36] Strongly secure identity-based authenticated key agreement protocols without bilinear pairings
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    INFORMATION SCIENCES, 2016, 367 : 176 - 193
  • [37] Identity-Based Threshold Proxy Signature from Bilinear Pairings
    Liu, Jenshiuh
    Huang, Shaonong
    INFORMATICA, 2010, 21 (01) : 41 - 56
  • [38] Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings
    Islam, S. K. Hafizul
    Biswas, G. P.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2013, 25 (01) : 51 - 61
  • [39] Efficient and provably secure certificateless signature from bilinear pairings
    He, Ming-Xing
    Li, Peng-Cheng
    Li, Xiao
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2015, 44 (06): : 887 - 891
  • [40] An identity-based proxy signature scheme from pairings
    Shim, Kyung-Ah
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71