Efficient Escrow-Free Identity-Based Signature

  • Yunmei Zhang
  • Joseph K. Liu
  • Xinyi Huang
  • Man Ho Au
  • Willy Susilo
Conference paper

DOI: 10.1007/978-3-642-33272-2_11

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7496)
Cite this paper as:
Zhang Y., Liu J.K., Huang X., Au M.H., Susilo W. (2012) Efficient Escrow-Free Identity-Based Signature. In: Takagi T., Wang G., Qin Z., Jiang S., Yu Y. (eds) Provable Security. ProvSec 2012. Lecture Notes in Computer Science, vol 7496. Springer, Berlin, Heidelberg

Abstract

The notion of identity-based signature scheme (IBS) has been proven useful in some scenarios where relying on the validity of the certificates is impractical. Nevertheless, one remaining inherent problem that hinders the adoption of this cryptographic primitive in practice is due to the key escrow problem, where the private key generator (PKG) can always impersonate the user in the system. In 2010, Yuen et al. proposed the notion of IBS that does not suffer from the key escrow problem. Nevertheless, their approach relies on the judge who will later blame the malicious PKG when such a dispute occurs, assuming that the PKG is willing to collaborate. Although the approach is attractive, but unfortunately it is impractical since the malicious PKG may just refuse to collaborate when such an incident happens. In this paper, we propose a new escrow-free IBS, which enjoys three main advantages, namely key escrow free, practical and very efficient. We present a generic intuition as well as an efficient instantiation. In our approach, there is no judge involvement required, as the public can determine the malicious behaviour of PKG when such an incident happens. Further, the signature size of our instantiation is only two group elements, which outperforms the existing constructions in the literature.

Keywords

identity-based signature key escrow efficiency practicality 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Yunmei Zhang
    • 1
  • Joseph K. Liu
    • 2
  • Xinyi Huang
    • 3
  • Man Ho Au
    • 1
  • Willy Susilo
    • 1
  1. 1.Centre for Computer and Information Security Research(CCISR), School of Computer Science and Software EngineeringUniversity of WollongongAustralia
  2. 2.Cryptography and Security DepartmentInstitute for Infocomm ResearchSingapore
  3. 3.School of Mathematics and Computer ScienceFujian Normal UniversityFuzhouChina

Personalised recommendations