期刊文献+

Efficient Hierarchical Identity Based Signature Scheme in the Standard Model 被引量:2

Efficient Hierarchical Identity Based Signature Scheme in the Standard Model
原文传递
导出
摘要 Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public key generation and identity authentication to lower-level public key generators. Most hierarchical identity based signature schemes are provably secure in the random oracle model or the weak models without random oracles such as gauntlet-ID model. Currently, there is no hierarchical identity based signature scheme that is fully secure in the standard model, with short public parameters and a tight reduction. In this paper, a hierarchical identity based signature scheme based on the q-SDH problem that is fully secure in the standard model is proposed. The signature size is independent of the level of the hierarchy. Moreover, our scheme has short public parameters, high efficiency and a tight reduction. Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root public key generator to distribute the workload by delegating public key generation and identity authentication to lower-level public key generators. Most hierarchical identity based signature schemes are provably secure in the random oracle model or the weak models without random oracles such as gauntlet-ID model. Currently, there is no hierarchical identity based signature scheme that is fully secure in the standard model, with short public parameters and a tight reduction. In this paper, a hierarchical identity based signature scheme based on the q-SDH problem that is fully secure in the standard model is proposed. The signature size is independent of the level of the hierarchy. Moreover, our scheme has short public parameters, high efficiency and a tight reduction.
机构地区 School of Electronic
出处 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期665-669,共5页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China (6057303) the Program for New Century Excellent Talents in University by Ministry of Education (NCET-05-0398)
关键词 HIERARCHICAL identity based standard model hierarchical identity based standard model
  • 相关文献

参考文献10

  • 1Hess F.Efficient Identity Based Signature Schemes Based on Pairings[].Proc of the SAC.2003
  • 2Yuen T,Wei V.Constant-Size Hierarchical Identity Based Signature/Signcryption without Random Oracles. http://eprint.iacr.org/2005/412 . 2007
  • 3Au M,Liu J,Yuen T, et al.Efficient Hierarchical Identity Based Signature in the Standard Model. http://eprint.iacr.org/2007/068 . 2007
  • 4Shamir A.Identity-based cryptosystems and signatureschemes[].Proc of CRYPTO.1984
  • 5Boneh,D.,Franklin,M.Identity-Based Encryption from the Weil Pairing[].Proceeding of Crypto.2001
  • 6Canetti R,,Halevi S,Katz J.Aforward secure public keyencryption scheme[].Procof Eurocrypt‘.2003
  • 7D Boneh,X Boyen.Efficient selective ID secure identity based encryption without random Oracles[].Advances in Cryptology—Euroerypt‘.2004
  • 8S. H. HENG,AND K. KUROSAWA.k-resilient identity-based encryption in the standard model[].Topics in Cryptology-CT-RSA.2004
  • 9D Boneh,X Boyen.Secure identity based encryption without random oracles[].Advances in Cryptology-Crypto‘.2004
  • 10Waters B.Efficient identity-based encryption without random oracles[].Proceeding of Advances in Cryptology-Eurocrypt’.2005

同被引文献15

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes [ C ]//Proc of CRYPTO 1984. New York: Springer-Verlag, 1985 : 47- 53.
  • 2BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairin[ C]//Proc of CRYPTO. Berlin:Springer, 2001:213-229.
  • 3BONEH D, BOYEN X. Efficient selective-id secure identity based encryption without random oracles [ C ]//Proc of EUROCRYPT. Berlin : Springer-Verlag, 2004 : 223- 238.
  • 4BONEH D,BOYEN X. Secure identity based encryption without random oracles [ C ]//Proc of CRYPTO. Berlin : Springer-Verlag, 2004 : 443-459.
  • 5GENTRY C. Practical identity-based encryption without random oracles [ C ]//Proc of EUROCRYPT. Berlin : Springer-Verlag, 2006 : 445-464.
  • 6PATERSON K G, SCHULDT J C N. Efficient identity-based signatures secure in the standard model [ C ]//Proc of ACISP. Berlin: Springer-Verlag, 2006 : 207 - 222.
  • 7ZHENG Yu-liang. Digital signcryption or how to achieve cost( signature & encryption ) < < cost ( signature ) + cost ( encryption ) [ C ]// Proc of Advances in CRYPTOLOGY-CRYPTO. London:Springer-Verlag, 1997: 165-179.
  • 8BAEK J,STEINFLD R, ZHENG Yu-liang . Formal proofs for the security of signcryption [ C ]//Proc of PKC. London : Springer-Verlag, 2002 : 363-366.
  • 9MALONE-LEE J. Identity-based signcryption [ J/OL ]. ( 2002 ). [ 2009-06-15 ]. http ://eprint. iacr. org/.
  • 10LIBERT B, QUISQUATER J J. New identity based signcryption schemes from pairings [ EB/OL ]. ( 2003 ). [ 2009- 06- 15 ]. http :// eprint. iacr. org/.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部