Information Security and Cryptology – ICISC 2012
Volume 7839 of the series Lecture Notes in Computer Science pp 456-471
Galindo-Garcia Identity-Based Signature Revisited
- Sanjit ChatterjeeAffiliated withDept. of Computer Science and Automation, Indian Institute of Science
- , Chethan KamathAffiliated withDept. of Computer Science and Automation, Indian Institute of Science
- , Vikas KumarAffiliated withDept. of Computer Science and Automation, Indian Institute of Science
Abstract
In Africacrypt 2009, Galindo-Garcia [12] proposed a lightweight identity-based signature (IBS) scheme based on the Schnorr signature. The construction is simple and claimed to be the most efficient IBS till date. The security is based on the discrete-log assumption and the security argument consists of two reductions: \(\mathcal{B}_{1}\) and \(\mathcal{B}_{2}\), both of which use the multiple-forking lemma [4] to solve the discrete-log problem (DLP).
In this work, we revisit the security argument given in [12]. Our contributions are two fold: (i) we identify several problems in the original argument and (ii) we provide a detailed new security argument which allows significantly tighter reductions. In particular, we show that the reduction \(\mathcal{B}_{1}\) in [12] fails in the standard security model for IBS [1], while the reduction \(\mathcal{B}_{2}\) is incomplete. To remedy these problems, we adopt a two-pronged approach. First, we sketch ways to fill the gaps by making minimal changes to the structure of the original security argument; then, we provide a new security argument. The new argument consists of three reductions: \(\mathcal{R}_{1}\), \(\mathcal{R}_{2}\) and \(\mathcal{R}_{3}\) and in each of them, solving the DLP is reduced to breaking the IBS. \(\mathcal{R}_{1}\) uses the general forking lemma [2] together with the programming of the random oracles and Coron’s technique [8]. Reductions \(\mathcal{R}_{2}\) and \(\mathcal{R}_{3}\), on the other hand, use the multiple-forking lemma along with the programming of the random oracles. We show that the reductions \(\mathcal{R}_{1}\) and \(\mathcal{R}_{2}\) are significantly tighter than their original counterparts.
Keywords
Identity-based signatures Galindo-Garcia identity-based signature Schnorr signatures Forking lemma Discrete-log assumption- Title
- Galindo-Garcia Identity-Based Signature Revisited
- Book Title
- Information Security and Cryptology – ICISC 2012
- Book Subtitle
- 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers
- Pages
- pp 456-471
- Copyright
- 2013
- DOI
- 10.1007/978-3-642-37682-5_32
- Print ISBN
- 978-3-642-37681-8
- Online ISBN
- 978-3-642-37682-5
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 7839
- Series ISSN
- 0302-9743
- Publisher
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Topics
- Keywords
-
- Identity-based signatures
- Galindo-Garcia identity-based signature
- Schnorr signatures
- Forking lemma
- Discrete-log assumption
- Industry Sectors
- eBook Packages
- Editors
-
-
Taekyoung Kwon
(16)
-
Mun-Kyu Lee
(17)
-
Daesung Kwon
(18)
-
Taekyoung Kwon
- Editor Affiliations
-
- 16. Department of Computer Engineering, Sejong University
- 17. School of Computer Science and Engineering, Inha University
- 18. National Security Research Institute
- Authors
-
-
Sanjit Chatterjee
(19)
-
Chethan Kamath
(19)
-
Vikas Kumar
(19)
-
Sanjit Chatterjee
- Author Affiliations
-
- 19. Dept. of Computer Science and Automation, Indian Institute of Science, Bangalore, India
Continue reading...
To view the rest of this content please follow the download PDF link above.