ID-based server-aided verification signature scheme with strong unforgeability
Papers|更新时间:2024-06-05
|
ID-based server-aided verification signature scheme with strong unforgeability
Journal on CommunicationsVol. 37, Issue 6, Pages: 49-55(2016)
作者机构:
西北师范大学计算机科学与工程学院,甘肃 兰州 730070
作者简介:
基金信息:
The National Natural Science Foundation of China(61262057);The Natural Science Foundation of Gansu Province(145RJDA325);The Science and Technology Project of State Archives Administration of China(2014-X-33);Research Fund of Higher Education of Gansu Province(2014-A011);Science and Technology Project of Lanzhou City of China(2013-4-22);The Foundation for Excellent Young Teachers by Northwest Normal University(NWNU-LKQN-13-23);The Foundation for Excellent Young Teachers by Northwest Normal University(NWNU-LKON-14-7)
Most identity-based signature schemes in the standard model are existentially unforgeable
which cannot prevent adversaries from forging valid signatures on messages that have previously been signed.However
signature verification algorithms of ID-based signature schemes in the standard model require expensive bilinear pairing operations.In order to overcome the shortcomings of the existing ID-based signature schemes such as strong security assumption and high computation cost,a strongly unforgeable ID-based server-aided verification signature scheme was presented.This scheme was proven to be secure under collusion attacks
adaptive chosen identity and message attacks in the standard model.Analysis results show that the proposed scheme effectively reduces computation cost of pairing operation
and it greatly reduces computational complexity of signature verification algorithm.The proposed scheme is more efficient than the existing ID-based signature schemes.
关键词
Keywords
references
SHAMIR A , . Identity-based cryptosystems and signature schemes [C ] // CRYPTO 1984,LNCS 0196 . Springer Berlin Heidelberg , 1984 : 47 - 53 .
BONEH D , FRANKLIN M . Identity-based encryption from the Weil pairing [C ] // CRYPTO 2001,LNCS 2139 . Springer Berlin Heidelberg , 2001 : 213 - 229 .
KAR J . Provably secure on-line/off-line identity-based signature scheme for wireless sensor network [J ] . IJ Network Security , 2014 , 16 ( 1 ): 29 - 39 .
TIAN M , HUANG L . Efficient identity-based signature from lattices [M ] . ICT Systems Security and Privacy Protection,Springer Berlin Heidelberg , 2014 : 321 - 329 .
TSENG Y M , TSAI T T , HUANG S S . Leakage-free ID-based signature [J ] . The Computer Journal , 2015 , 58 ( 4 ): 750 - 757 .
ATTRAPADUNG N , EMURA K , HANAOKA G , et al . A revocable group signature scheme from identity-based revocation techniques:achieving constant-size revocation list [C ] // Applied Cryptography and Network Security . 2014 : 419 - 437 .
HAO S G , LI Z , GHULAM M . A union authentication protocol of cross-domain based on bilinear pairing [J ] . Journal of Software , 2013 , 8 ( 5 ): 1094 - 1100 .
ZHANG J , SUN Z . An ID-based server-aided verification short signature scheme avoid key escrow [J ] . Journal of Information Science and Engineering , 2013 , 29 ( 3 ): 459 - 473 .
CANETTI R , GOLDREICH O , HALEVI S . The random oracle methodology,revisited [J ] . Journal of the ACM , 2004 , 51 ( 4 ): 557 - 594 .
PATERSON K G , SCHULDT J C N . Efficient identity-based signatures secure in the standard model [C ] // ACISP,LNCS 4058 . Springer Berlin Heidelberg , 2006 : 207 - 222 .
WU Q , ZHANG L Y . New strongly unforgeable identity-based signature scheme in the standard model [J ] . Journal of Beijing University of Posts and Telecommunications , 2011 , 34 ( 3 ): 71 - 74 .
TSAI T T , TSENG Y M , HUANG S S . Efficient strongly unforgeable ID-based signature without random oracles [J ] . Informatica , 2014 , 25 ( 3 ): 505 - 521 .
HUNG Y H , TSAI T T , TSENG Y M , et al . Strongly secure revocable ID-based signature without random oracles [J ] . Information Technology and Control , 2014 , 43 ( 3 ): 264 - 276 .
KWON S . An identity-based strongly unforgeable signature without random oracles from bilinear pairings [J ] . Information Sciences , 2014 , 276 ( 1 ): 1 - 9 .
WU W , MU Y , SUSILO W , et al . Provably secure server-aided verification signatures [J ] . Computers &Mathematics with Applications , 2011 , 61 ( 7 ): 1705 - 1723 .
WANG Z , WANG L , YANG Y , et al . 's server-aided verification signature schemes [J ] . IJ Network Security , 2010 , 10 ( 2 ): 158 - 160 .
WU H , XU C X , DENG J , et al . On the security of server-aided verification signature schemes [J ] . Journal of Computational Information System , 2013 , 9 ( 4 ): 1449 - 1454 .