An Identity-based Mediated Signature Scheme from Bilinear Pairing

نویسندگان

  • Xiangguo Cheng
  • Lifeng Guo
  • Xinmei Wang
چکیده

It has always been a critical issue to find efficient methods for fast revocation of a user’s identity in identity (ID)based cryptosystems. Unfortunately, none of the previous ID-based cryptography can find a practical way. Libert et al. and Baek et al. respectively propose an ID-based mediated encryption scheme based on the practical ID-based encryption scheme from bilinear pairing due to Boneh and Franklin. Both schemes provide an efficient method for immediate revocation of a user’s identity. However, no ID-based mediated signature scheme from bilinear pairing has been found so far. The essential reason is that most of the previous ID-based signatures from bilinear pairing are no “good” enough to generate their mediated versions. In this paper, we first presents an ID-based signature scheme from bilinear pairing. It is secure against existential forgery under adaptively chosen message and ID attack in the random oracle model. Furthermore, it has the good property of addition, thus can be used to construct an efficient ID-based mediated signature scheme. Combining this scheme with one of the above two mediated encryption schemes yields a complete solution to the fast revocation of a user’s identity in ID-based cryptosystems from bilinear pairing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues

The term “proxy multi-signature” refers to the situation in which a proxy signer is authorized to sign a message on behalf of a group of original signers. Combined with identity-based cryptography, we proposed an efficient identity-based proxy multi-signature scheme using cubic residues without bilinear pairing. Our scheme is secure against existential forgery on adaptive chosenmessage and iden...

متن کامل

Convertible limited (multi-) verifier signature: new constructions and applications

A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...

متن کامل

ID-Based Blind Signature and Ring Signature from Pairings

Recently the bilinear pairing such as Weil pairing or Tate pairing on elliptic curves and hyperelliptic curves have been found various applications in cryptography. Several identity-based (simply ID-based) cryptosystems using bilinear pairings of elliptic curves or hyperelliptic curves were presented. Blind signature and ring signature are very useful to provide the user’s anonymity and the sig...

متن کامل

ID-based multi-proxy multi-signature scheme from bilinear pairing

Identity-based (ID-based) public key settings are very good alternatives for the certificate based public key settings. Proxy signatures are good tools to delegate the signing capability by original signer to any other parties. The concept of bilinear pairing is very useful in many signature protocols for the ease of computation. Here, we propose an ID-based multi-proxy multi-signature scheme u...

متن کامل

Identity-based Digital Signature Scheme Without Bilinear Pairings

Many identity-based digital signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over elliptic curve group. In order to save the running time and the size of the signature, we propose an identity based signature scheme without bilinear pairings. With both the run...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2006