Advertisement

ID-Based Signature Scheme Without Trusted PKG

  • Jian Liao
  • Junfang Xiao
  • Yinghao Qi
  • Peiwei Huang
  • Mentian Rong
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3822)

Abstract

Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest PKG can forge the signature of any user. On the other hand, the user can deny the signature actually signed by him/herself. To avoid the key escrow problem, we present an ID-based signature scheme without trusted Private Key Generator (PKG). We also presented the exact proof of security to demonstrate that our scheme is secure against existential forgery on adaptively chosen messages and ID attacks assuming the complexity of Computational Diffie-Hellman (CDH) problem. Compared with other signature schemes, the proposed scheme is more efficient.

Keywords

Signature Scheme Random Oracle Bilinear Pairing Ring Signature Scheme Existential Forgery 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  2. 2.
    Sattam, S., Al-Riyami, S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Cha, J.C., Cheon, J.H.: An identity-based signature from gap diffie-hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Chen, X., Zhang, F.G., Kim, K.: A New ID-based Group Signature Scheme from Bilinear Pairings, In: Kijoon Chae, Moti Yung (Eds.): Proceedings of WISA’03, 585-592, Jeju Island, Korea. The full version appears in Cryptology ePrint Archive: http://eprint.iacr.org/2003/116
  6. 6.
    Libert, B.: Jean-Jacques Quisquater: The Exact Security of an Identity Based Signature and its Applications. The full version appears in Cryptology ePrint Archive: http://eprint.iacr.org/2004/102.pdf
  7. 7.
    Balfanz, D., Durfee, G., Shankar, N., Smentters, D., Staddon, J., Wong, H.: Secret handshakes from pairing-based agreements. In: Proceeding of the 2003 IEEE Symposiumon Security and Privacy, Berkeley, CA, United States, pp. 180–196 (2003)Google Scholar
  8. 8.
    Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268–286. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, C.K.P.: Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352–369. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  13. 13.
    Yum, D.H., Lee, P.J.: Generic construction of certificateless signature. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 200–211. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Jian Liao
    • 1
  • Junfang Xiao
    • 1
  • Yinghao Qi
    • 1
  • Peiwei Huang
    • 1
  • Mentian Rong
    • 1
  1. 1.Department of Electronic EngineeringShangHai JiaoTong UniversityShanghaiP.R. China

Personalised recommendations