期刊文献+

Adaptively secure hierarchical identity-based signature in the standard model 被引量:2

Adaptively secure hierarchical identity-based signature in the standard model
原文传递
导出
摘要 Hierarchical identity-based signature (HIBS) has wide applications in the large network. However,the existing works cannot solve the trade-off between the security and efficiency. The main challenge at present is to construct a high efficient and strong secure HIBS with a low computation cost. In this paper,a new construction of HIBS scheme is proposed. The new scheme achieves the adaptive security which is a strong security in the identity-based cryptography. But our scheme has short public parameters and the private keys size shrinks as the hierarchy depth increases. The signature size is a constant and the cost of verification only requires four bilinear pairings,which are independent of hierarchy depth. Furthermore,under the q-strong computational diffie-Hellman problem (q-SDH) assumption,the scheme is provably secure against existential forgery for adaptive chosen message and identity attack in the standard model. Hierarchical identity-based signature (HIBS) has wide applications in the large network. However,the existing works cannot solve the trade-off between the security and efficiency. The main challenge at present is to construct a high efficient and strong secure HIBS with a low computation cost. In this paper,a new construction of HIBS scheme is proposed. The new scheme achieves the adaptive security which is a strong security in the identity-based cryptography. But our scheme has short public parameters and the private keys size shrinks as the hierarchy depth increases. The signature size is a constant and the cost of verification only requires four bilinear pairings,which are independent of hierarchy depth. Furthermore,under the q-strong computational diffie-Hellman problem (q-SDH) assumption,the scheme is provably secure against existential forgery for adaptive chosen message and identity attack in the standard model.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第6期95-100,共6页 中国邮电高校学报(英文版)
基金 supported by the National Natural Science Foundation of China (60970119, 60803149) the National Basic Research Program of China (2007CB311201) the Fundamental Research Funds for the Central Universities
关键词 Hierarchical identity-based signature adaptive security standard model q-SDH problem provably secure Hierarchical identity-based signature adaptive security standard model q-SDH problem provably secure
  • 相关文献

参考文献1

二级参考文献2

同被引文献32

  • 1李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 2Shamir A. Identity-based cryptosystems and signature schemes[C] //LNCS 196.. Proc of the Advances in Cryptography-Crypto'84. Berlin: Springer, 1984:47-53.
  • 3Waters B. Efficient identity-based encryption without random oracles [G] //LNCS 3494 Cryptography--Eurocrypt'05 127 Proc of the Advances in Berlin: Springer, 2005: 114-127.
  • 4Paterson K G, Schuldt J C. Efficient identity-based signatures secure in the standard model [G] //LNCS 4058: Proe of Information Security and Privacy-ACISP'06. Berlin: Springer, 2006:207-222.
  • 5Gentry C, Silverberg A. Hierarchical ID-based cryptography [G] //LNCS 2501: Proc of the Advances in Cryptography- Asiacrypt'02. Berlin: Springer, 2002:548-566.
  • 6Boneh D, Boyen X. Efficient seleetive-ID secure identity based encryption without random oracles [G] //LNCS 3027: Proc of the Advances in Cryptography-Eurocrypt'04. Berlin: Springer, 2004:223-238.
  • 7Chow S M, Hiu C K, Yiu S M, et al. Secure hierarchical identity based signature and its application [G] ffLNCS 3269: Proc of Information and Communications Security- ICICS'04. Berlin: Springer, 2004: 480-494.
  • 8Yuen T H, Wei V K. Constant-size hierarchical identitybased signature/signcryption without random oracles [R/OL]. ( 2005-06-03 ) [ 2011-04-07 ]. http://eprint, iacr. org/2005/412.
  • 9Man H A, Joseph K L, Tsz H Y, et al. Efficient hierarchical identity based signature in the standard model [R/OL]. (2007-11-02) [2011-04-07]. httpJ/eprint, iacr. org/2007/068.
  • 10Man H A, Joseph K L, Tsz H Y, et al. Practical hierarchical identity based encryption and signature schemes without random oracles [R/OL]. (2006-12-04) [2011-04- 07]. http://eprint, iacr. org/2006/368.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部