A Provably Secure Scalable Revocable Identity-Based Signature Scheme Without Bilinear Pairings

被引:0
|
作者
Wang, Changji [1 ,2 ]
Huang, Hui [3 ]
Yuan, Yuan [4 ]
机构
[1] Guangdong Univ Foreign Studies, Sch Informat Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Shanghai Key Lab Integrated Adm Technol Informat, Shanghai 200240, Peoples R China
[3] Guangdong Univ Finance & Econ, Sch Stat & Math, Guangzhou 510320, Guangdong, Peoples R China
[4] Guangdong Univ Foreign Studies, Sch Math & Stat, Guangzhou 510006, Guangdong, Peoples R China
关键词
Revocable identity-based encryption; Revocable identity-based signature; KUNode algorithm; Random oracle model; ENCRYPTION;
D O I
10.1007/978-3-030-16946-6_47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Revocation functionality is essential for the practical deployment of identity-based cryptosystems because a user's private key may be corrupted by hacking or the period of a contract expires. Many researchers are focusing on revocable identity-based encryption scheme, while revocable identity-based signature scheme has received limited concentration. Recently, several revocable identity-based signature schemes have been proposed. However, these schemes are not scalable and are vulnerable to signing key exposure attack. In this paper, we first refine the security model of revocable identity-based signature scheme by considering the signing key exposure attack. Then, we propose a scalable revocable identity-based signature scheme with signing key exposure resistance. Finally, we prove the proposed scheme is existentially unforgeable against adaptively chosen message and identity attacks under the standard discrete logarithm assumption in the random oracle model.
引用
收藏
页码:588 / 597
页数:10
相关论文
共 50 条
  • [41] Provably secure identity-based threshold unsigncryption scheme
    Yang, Bo
    Yu, Yong
    Li, Fagen
    Sun, Ying
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 114 - +
  • [42] Provably secure self-certified partially blind signature scheme from bilinear pairings
    Lin, Xiaodong
    Lu, Rongxing
    Zhu, Haojin
    Ho, Pin-Han
    Shen, Xuemin
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1530 - 1535
  • [43] A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
    Lo, Nai-Wei
    Tsai, Jia-Lun
    JOURNAL OF APPLIED MATHEMATICS, 2014,
  • [44] Identity-based Threshold Ring Signature Without Pairings
    Xiong Hu
    Qin ZhiGuang
    Li Fagen
    Jin Jing
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 537 - 541
  • [45] Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9
    Lai, Jianchang
    Huang, Xinyi
    He, Debiao
    Wu, Wei
    COMPUTER JOURNAL, 2022, 65 (07): : 1692 - 1701
  • [46] Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices
    Xie, Congge
    Weng, Jian
    Wen, Jinming
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [47] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):
  • [48] A provably secure identity-based proxy ring signature based on RSA
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1223 - 1236
  • [49] A Proxy Ring Signature Scheme with Revocable Anonymity from Bilinear Pairings
    Wang, Huaqun
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 191 - 194
  • [50] Scalable revocable identity-based signature over lattices in the standard model
    Xie, Congge
    Weng, Jian
    Weng, Jiasi
    Hou, Lin
    INFORMATION SCIENCES, 2020, 518 : 29 - 38