Abstract
In this paper we propose an identity(ID)-based signature scheme using gap Diffie-Hellman (GDH) groups. Our scheme is proved secure against existential forgery on adaptively chosen message and ID attack under the random oracle model. Using GDH groups obtained from bilinear pairings, as a special case of our scheme, we obtain an ID-based signature scheme that shares the same system parameters with the IDbased encryption scheme (BF-IBE) by Boneh and Franklin [BF01], and is as efficient as the BF-IBE. Combining our signature scheme with the BF-IBE yields a complete solution of an ID-based public key system. It can be an alternative for certificate-based public key infrastructures, especially when efficient key management and moderate security are required.
Chapter PDF
Similar content being viewed by others
References
D. Boneh and M. Franklin, Identity Based Encryption from the Weil Pairing, Proc. of Crypto’ 01, Lecture Notes in Computer Science, Vol. 2139, pp. 213–229, Springer-Verlag, 2001. (A full version is available from http://crypto.stanford.edu/ dabo/pubs.html) 18, 19, 21, 22, 26, 27, 28, 29
P. Barreto and H. Kim, Fast Hashing onto Elliptic Curves over Fields of Characteristic 3, Available from http://eprint.iacr.org, 2002.
P. Barreto, H. Kim, and M. Scott, Efficient Algorithms for Pairing-based Cryptosystems, Available from http://eprint.iacr.org, 2002. 28
D. Boneh, B. Lynn, and H. Shacham, Short Signatures from the Weil Pairing, Proc. of Asiacrypt’ 01, Lecture Notes in Computer Sciences, Vol. 2248, pp. 514–532, Springer-Verlag, 2001. 20, 26, 27, 28
J. Cheon and J. Cha, Identity-based Signatures from the Weil Pairing, Available from http://vega.icu.ac.kr/ jhcheon/publications.html, 2001. 19
Y. Desmedt and J. Quisquater, Public-key Systems based on the Difficulty of Tampering, Proc. of Crypto’ 86, Lecture Notes in Computer Sciences, Vol. 263, pp. 111–117, Springer-Verlag, 1987. 18
U. Feige, A. Fiat, and A. Shamir, Zero-knowledge proofs of identity, J. Cryptology, Vol. 1, pp. 77–94, 1988.
A. Fiat and A. Shamir, How to prove youself: Practical solutions to identi fication and signature problems, Proc. of Crypto’ 86, Lecture Notes in Computer Sciences, Vol. 263, pp. 186–194, Springer-Verlag, 1987.
F. Hess, Exponent group signature schemes and efficient identity based signature schemes based on pairings, Available from http://eprint.iacr.org, 2002. 19
S. Galbraith, Supersingular curves in cryptography, Proc. of Asiacrypt’ 01, Lecture Nores in Computer Sciences, Vol. 2248, pp. 495–513, Springer-Verlag, 2001. 26, 27
A. Menezes, Elliptic curve public key cryptosystems, Kluwer Academic Publishers, 1993. 26
U. Maurer and Y. Yacobi, Non-interective public-key cryptography, Proc. of Eurocrypto’ 91, Lecture Nores in Computer Sciences, Vol. 547, pp. 498–507, Springer-Verlag, 1992. 18
T. Okamoto and D. Pointcheval, The gap-problems: a new class of problems for the security of cryptographic Schemes, Proc. of PKC’ 01, Lecture Nores in Computer Sciences, Vol. 1992, pp. 104–118, Springer-Verlag, 2001. 20
K. Paterson, ID-based signatures from pairings on elliptic curves, Available from http://eprint.iacr.org, 2002. 19
D. Pointcheval and J. Stern, Security proofs for signature schemes, Proc. of Eurocrypt’ 96, Lecture Notes in Computer Sciences, Vol. 1070, pp. 387–398, Springer-Verlag, 1996. 25
D. Pointcheval and J. Stern, Security arguments for digital signatures and blind signatures, J. of Cryptology, Vol. 13, pp. 361–396, 2000. 23, 25, 26
A. Shamir, Identity-base cryptosystems and signature schemes, Proc. of Crypto’ 84, Lecture Notes in Computer Science, Vol. 196, pp. 47–53, Springer-Verlag, 1985. 18, 19, 29
R. Sakai, K. Ohgishi, and M. Kasahara, Cryptosystems based on pairing, Proc. of SCIS’ 00, Okinawa, Japan, Jan. pp. 26–28, 2001. 18
H. Tanaka, A realization scheme for the identity-based cryptosystem, Proc. of Crypto’ 87, Lecture Nores in Computer Sciences, Vol. 293, pp. 341–349, Springer-Verlag, 1987. 18
S. Tsuji and T. Itoh, An ID-based cryptosystem based on the discrete logarithm problem, IEEE Journal of Selected Areas in Communications, Vol. 7, No. 4, pp. 467–473, 1989. 18
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Choon, J.C., Hee Cheon, J. (2003). An Identity-Based Signature from Gap Diffie-Hellman Groups. In: Desmedt, Y.G. (eds) Public Key Cryptography — PKC 2003. PKC 2003. Lecture Notes in Computer Science, vol 2567. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36288-6_2
Download citation
DOI: https://doi.org/10.1007/3-540-36288-6_2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00324-3
Online ISBN: 978-3-540-36288-3
eBook Packages: Springer Book Archive