An efficient online/offline ID-based short signature procedure using extended chaotic maps
- 78 Downloads
- 1 Citations
Abstract
Chaos has been dealt with a decent approach to reduce computational complexity while fulfilling security necessities of a cryptographic techniques. In this article, we purpose an efficient online/offline ID-based short signature procedure based on extended chaotic maps and also demonstrated that it is protected under unforgeability of ID-based short signature under chosen message attack. Some of the intriguing arrangements of presented procedures is that it gives multi-time use of the offline stockpiling, which permits the signer to reuse the offline pre-administered information in polynomial time, rather than one-time use in all past online/offline signature procedures.
Keywords
Extended chaotic maps Signature technique ID-based short signature procedure UF-IBSS-CMANotes
Acknowledgements
The author would like to thank both anonymous reviewers for their helpful advice. This work was supported by Dr. D.S. Kothari Post-Doctoral fellowship awarded by University Grants Commission, New Delhi, India.
Compliance with ethical standards
Conflicts of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
References
- Bellare M, Namprempre C, Neven G (2009) Security proofs for identity based identification and signature schemes. J Cryptol 22:1–61MathSciNetCrossRefzbMATHGoogle Scholar
- Boneh D, Boyen X (2008) Short signatures without random oracles the SDH assumption in bilinear groups. J Cryptol 2:149–177MathSciNetCrossRefzbMATHGoogle Scholar
- Cha J, Cheon J (2003) An identity-based signature from gap Diffie Hellman groups. In: Proceedings of PKC’2003. Lecture notes in computer science. Springer, Berlin, vol 2567, pp 18–30Google Scholar
- Chain K, Kuo WC (2013) A new digital signature scheme based on chaotic maps. Nonlinear Dyn 74:1003–1012MathSciNetCrossRefzbMATHGoogle Scholar
- Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761MathSciNetCrossRefzbMATHGoogle Scholar
- Chen G, Chen Y, Liao X (2007a) An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fractals 31(3):571–579MathSciNetCrossRefzbMATHGoogle Scholar
- Chen X, Zhang F, Susilo W, Mu Y (2007b) Efficient generic online/offline signatures without key exposure. In: Proceedings of ACNS ’07. Lecture notes in computer science. Springer, Berlin, vol 4521, pp 18–30Google Scholar
- Dachselt F, Schwarz W (2001) Chaos and cryptography. IEEE Trans Circuits Syst I Fundam Theory Appl 48(12):1498–1509MathSciNetCrossRefzbMATHGoogle Scholar
- Deng S, Li Y, Xiao D (2010) Analysis and improvement of a chaos-based Hash function construction. Commun Nonlinear Sci Numer Simul 15(5):1338–1347MathSciNetCrossRefzbMATHGoogle Scholar
- Even S, Goldreich O, Micali S (1989) On-line/off-line digital signatures. In: Proceedings of CRYPTO ’89. Lecture notes in computer science. Springer, New York, vol 2442, pp 263-277Google Scholar
- Galindo D, Garcia F (2009) A schnorr-like lightweight identity-based signature scheme. In: Progress in cryptology-AFRICACRYPT 2009. Lecture notes in computer science. Springer, Berlin, vol 5580, pp 135–148Google Scholar
- Gao Y, Zeng P, Raymond Choo KK, Song F (2016) An improved online/offline identity-based signature scheme for WSNs. Int J Netw Secur 18(6):1143–1151Google Scholar
- Guillou LC, Quisquater JJ (1989) A “Paradoxical” identity-based signature scheme resulting from zero-knowledge. In: Proceedings of CRYPTO 88. Lecture notes in computer science. Springer, Berlin, vol 403, pp 216–231Google Scholar
- Han S, Chang E (2009) Chaotic map based key agreement without clock synchronization. Choas Soliton Fractals 39(3):1283–1289MathSciNetCrossRefzbMATHGoogle Scholar
- Herranz J (2005) Deterministic identity-based signatures for partial aggregation. Comput J 49(3):322–330CrossRefGoogle Scholar
- Hess F (2003) Efficient identity based signature schemes based on pairings. In: Selected area in cryptography, SAC2002. Lecture notes in computer science. Springer, Berlin, vol 2595, pp 310–324Google Scholar
- Joye M (2008) An efficient on-line/off-line signature scheme without random oracles. In: Proceedings of CANS ’08. Lecture notes in computer science. Springer, Berlin, vol 5339, pp 98–107Google Scholar
- Jye S (2011) A speech encryption using fractional chaotic systems. Nonlinear Dyn 65:103–108MathSciNetCrossRefzbMATHGoogle Scholar
- Kang B, Boyd C, Dawson E (2009) A novel identity-based strong designated verifier signature scheme. J Syst Softw 82:270–273CrossRefGoogle Scholar
- Kar J (2014) Provably secure online/off-line identity-based signature scheme for wireless sensor network. Int J Netw Secur 16(1):29–39Google Scholar
- Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1(3):6–21MathSciNetCrossRefGoogle Scholar
- Kurosawa K, Schmidt-Samoa K (2006) New online/offline signature schemes without random oracles. In: Proceedings of PKC ’06. Lecture notes in computer science. Springer, Berlin, vol 3958, pp 330–346Google Scholar
- Lai YM, Cheng PJ, Lee CC, Ku CY (2016) A new ticket-based authentication mechanism for fast handover in mesh network. PLoS ONE 11(5):e0155064CrossRefGoogle Scholar
- Lee CC, Hsu CW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1–2):201–211MathSciNetCrossRefGoogle Scholar
- Lee CC, Chen CL, Wu CY, Huang SY (2012) An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn 69(1–2):79–87MathSciNetCrossRefzbMATHGoogle Scholar
- Lee CC, Hsu CW, Lai YM, Vasilakos AV (2013) An enhanced mobile-healthcare emergency system based on extended chaotic maps. J Med Syst 37(5):9973CrossRefGoogle Scholar
- Lee CC, Li CT, Hsu CW (2013) A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn 73(1–2):125–132MathSciNetCrossRefzbMATHGoogle Scholar
- Lee CC, Li CT, Chiu ST, Lai YM (2014) A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn 79(4):2485–2495MathSciNetCrossRefzbMATHGoogle Scholar
- Lee CC, Lou DC, Li CT, Hsu CW (2014) An extended chaotic-maps-based protocol with key agreement for multiserver environments. Nonlinear Dyn 76(1):853–866MathSciNetCrossRefzbMATHGoogle Scholar
- Li F, Shirase M, Takagi T (2008) On the security of online/offline signatures and multisignatures from acisp’06. In: Proceedings of CANS ’08. Lecture notes in computer science. Springer, Berlin, vol 5339, pp 108–119Google Scholar
- Li CT, Lee CC, Weng CY (2014) A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J Med Syst 38(9):77CrossRefGoogle Scholar
- Li CT, Lee CC, Weng CY, Chen SJ (2016) A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J Med Syst 40(11):233CrossRefGoogle Scholar
- Mason JC, Handscomb DC (2003) Chebyshev polynomials. Chapman and Hall/CRC, Boca RatonzbMATHGoogle Scholar
- Meshram C (2015) An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem. Inf Process Lett 115(2):351–358MathSciNetCrossRefzbMATHGoogle Scholar
- Meshram C (2015) An efficient ID-based beta cryptosystem. Int J Secur Appl 9(2):189–202MathSciNetGoogle Scholar
- Meshram C, Li X (2017) New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group. J Inf Optim Sci 10(1080/02522667):1411013Google Scholar
- Meshram C, Meshram S (2013) An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem. Inf Process Lett 113(10–11):375–380MathSciNetCrossRefzbMATHGoogle Scholar
- Meshram C, Meshram SA (2017) Constructing new An ID-based cryptosystem for IFP and GDLP based cryptosystem. J Discrete Math Sci Cryptogr 20(5):1121–1134MathSciNetCrossRefGoogle Scholar
- Meshram C, Obaidat MS (2015) An ID-based quadratic-exponentiation randomized cryptographic scheme. In: IEEE proceeding of international conference on computer, information and telecommunication systems, pp 1–5Google Scholar
- Meshram C, Powar PL (2016) An efficient identity-based QER cryptographic scheme. Complex Intell Syst 2(4):285–291CrossRefGoogle Scholar
- Meshram C, Meshram S, Zhang M (2012) An ID-based cryptographic mechanisms based on GDLP and IFP. Inf Process Lett 112(19):753–758MathSciNetCrossRefzbMATHGoogle Scholar
- Meshram C, Powar PL, Obaidat MS, Lee CC (2016a) An IBE technique using partial discrete logarithm. Proc Comput Sci 93:735–741CrossRefGoogle Scholar
- Meshram C, Powar PL, Obaidat MS (2016b) An UF-IBSS-CMA protected online/offline identity-based short signature technique using PDL. Proc Comput Sci 93:847–853CrossRefGoogle Scholar
- Meshram C, Lee CC, Li CT, Chen CL (2017a) A secure key authentication scheme for cryptosystems based on GDLP and IFP. Soft Comput 21(24):7285–7291CrossRefGoogle Scholar
- Meshram C, Tseng YM, Lee CC, Meshram SG (2017b) An IND-ID-CPA secure ID-based cryptographic protocol using GDLP and IFP. Informatica 28(3):471–484MathSciNetCrossRefzbMATHGoogle Scholar
- Meshram C, Obaidat MS, Meshram SG (2017c) Chebyshev chaotic maps based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography. Secur Priv. https://doi.org/10.1002/spy2.12
- Selvi SD, Sree V, Rangan CP (2011) Identity-based deterministic signature scheme without forking-lemma. Adv Inf Comput Secur 7038:79–95 Lecture Notes in Computer SciencezbMATHGoogle Scholar
- Shamir A, Tauman Y (2001) Improved online/offline signature schemes. In: Proceedings of CRYPTO ’01. Lecture notes in computer science. Springer, Berlin, vol 2139, pp 355–367Google Scholar
- Wang Y, Wong K, Liao X, Xiang T (2009) A block cipher with dynamic S-boxes based on tent map. Commun Nonlinear Sci Numer Simul 14(7):3089–3099MathSciNetCrossRefzbMATHGoogle Scholar
- Wang X, Yang L, Liu R (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62:615–621CrossRefzbMATHGoogle Scholar
- Wang X, Wang X, Zhao J (2011) Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn 63:587–597MathSciNetCrossRefGoogle Scholar
- Wong KW (2002) A fast chaotic cryptography scheme with dynamic look up table. Phys Lett A 298(4):238–242MathSciNetCrossRefzbMATHGoogle Scholar
- Xiao D, Shih F, Liao X (2010) A chaos-based hash function with both modification detection and localization capabilities. Commun Nonlinear Sci Numer Simul 15(9):2254–2261MathSciNetCrossRefzbMATHGoogle Scholar
- Xu S, Mu Y, Susilo W (2006) Online/offline signatures and multisignatures for AVOD and DSR routing security. In: Proceedings of ACISP ’06. Lecture notes in computer science. Springer, Berlin, vol 4058, pp 99–110Google Scholar
- Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fract 37(3):669–674MathSciNetCrossRefzbMATHGoogle Scholar