Abstract
SM9 is the identity-based cryptography (IBC) promulgated by the State Cryptography Administration of China. SM9-IBS has become an international standard in 2017 (the main part of ISO/IEC 14888-3/AMD1 standard). SM9-IBS reduces the certificate application and verification phases, which has obvious advantages in identity authentication in mobile Internet, Internet of things (IoT), big data, and other fields. Many researchers use SM9 as the underlying cryptography and have successively proposed extended signatures such as group, ring, and two-party cooperation. In order to further promote the application of SM9, reduce the pressure of root KGC and improve the reliability of the system, we present a secure and feasible hierarchical SM9 signature scheme which is the first SM9-IBS (Identity-based Signature) extension. Also, we prove its security is existentially unforgeable under adaptive chosen message and identity attacks (EUF-CMIA) in the standard model. At the same time, the implementation of our scheme using Java does not lead to an additional performance burden based on the SM9 algorithm.
This work is supported by National Key R &D Program of China (2017YFB0802500), Beijing Municipal Science and Technology Project (No. Z191100007119007) and Shandong province major science and technology innovation project (2019JZZY020129).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aruna, J., Ashwani, D.: Improved identity based digital signature authentication using Feistel algorithm in cloud computing. In: Satapathy, S.C., Bhateja, V., Raju, K.S., Janakiramaiah, B. (eds.) Computer Communication, Networking and Internet Security. LNNS, vol. 5, pp. 347–354. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-3226-4_35
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Wang, J., Yu, J., Li, D., Bai, X., Jia, Z.: Combining user authentication with role-based authorazition based on identity-based signature. In: Wang, Y., Cheung, Y., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol. 4456, pp. 847–857. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74377-4_89
H. Liao, D. Wang, J. Wang, L. Li, H. Wang, Research and application of sm9 in the ubiquitous electric iot, in: IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC). IEEE 2020, 1764–1768 (2020)
Park, S., Lee, K., Lee, D.H.: New constructions of revocable identity-based encryption from multilinear maps. IEEE Trans. Inf. Forensics Secur. 10(8), 1564–1577 (2015)
Ma, X.-T., Ma, W.-P., Liu, X.-X.: A cross domain authentication scheme based on blockchain technology. ACTA ELECTONICA SINICA 46(11), 2571 (2018)
Xuan, J., Wang, D., Li, Z., Zhang, S.: Design of secure and independent controllable email system based on identity-based cryptography. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), pp. 217–222. IEEE (2016)
Ya-Tao, Y., Ju-Liang, C., Xiao-Wei, Z., et al.: Privacy preserving scheme in block chain with provably secure based on SM9 algorithm. J. Softw. 30(6), 1692–1704 (2019)
Mu, Y., Xu, H., Li, P., Ma, T.: Secure two-party SM9 signing, Science China. Inf. Sci. 63(8), 1–3 (2020)
Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445–464. Springer, Heidelberg (2006). https://doi.org/10.1007/11761679_27
Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352–369. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24691-6_26
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13
Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing, SCIS 2000–c20, Jan, Okinawa, Japan (2000)
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_4
Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223–238. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_14
Boneh, D., Boyen, X.: Secure identity based encryption without random oracles. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 443–459. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28628-8_27
Horwitz, J., Lynn, B.: Toward Hierarchical Identity-Based Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466–481. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-46035-7_31
Chow, S.S.M., Yuen, T.H., Hui, L.C.K., Yiu, S.M.: Signcryption in hierarchical identity based cryptosystem. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds.) SEC 2005. IAICT, vol. 181, pp. 443–457. Springer, Boston, MA (2005). https://doi.org/10.1007/0-387-25660-1_29
Wu, Q., Zhang, L.: Hierarchical identity-based signature with short public keys. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 272–281. Springer, Cham (2013). https://doi.org/10.1007/978-3-319-03584-0_20
Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36178-2_34
Lim, H.W., Paterson, K.G.: Multi-key hierarchical identity-based signatures. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 384–402. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77272-9_23
Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005). https://doi.org/10.1007/11593447_28
Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387–398. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68339-9_33
Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000)
Acknowledgements
This work is supported by National Key R &D Program of China (2017YFB0802500), Beijing Municipal Science and Technology Project (No. Z191100007119007) and Shandong province major science and technology innovation project (2019JZZY020129).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Yan, C., Xu, H., Mu, Y., Ding, J. (2022). Pitch in: A Secure Extension Signature Based on SM9. In: Su, C., Sakurai, K., Liu, F. (eds) Science of Cyber Security. SciSec 2022. Lecture Notes in Computer Science, vol 13580. Springer, Cham. https://doi.org/10.1007/978-3-031-17551-0_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-17551-0_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-17550-3
Online ISBN: 978-3-031-17551-0
eBook Packages: Computer ScienceComputer Science (R0)