×

zbMATH — the first resource for mathematics

Forward-secure ID based digital signature scheme with forward-secure private key generator. (English) Zbl 1440.94073
Summary: In an identity based digital signature scheme, a private key generator (PKG) uses its master secret key to issue a user private key to an ID. Thus, forward secrecy of the system is not retained unless forward secrecy of the master secret key is provided. However, current forward secure identity based digital signature schemes only focus on forward secrecy of user private keys. In this paper, we capture forward secrecy of both PKG’s master secret and user private keys, and formalize a new definition of “forward-secure ID based signature schemes with forward-secure PKG”. Then, we design a scheme and prove its security under the BDHI assumption in the standard model (without random oracles).
MSC:
94A60 Cryptography
94A62 Authentication, digital signatures and secret sharing
PDF BibTeX XML Cite
Full Text: DOI
References:
[1] Abdalla, M.; Reyzin, L., A new forward-secure digital signature scheme, Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, 116-129 (2000) · Zbl 0966.94019
[2] Alsmirat, M. A.; Jararweh, Y.; Obaidat, I.; Gupta, B. B., Internet of surveillance: a cloud supported large-scale wireless surveillance system, J. Supercomput., 73, 3, 973-992 (2017)
[3] Anderson, R., Two remarks on public-key cryptology - invited lecture, In the Fourth ACM Conference on Computer and Communications Security (CCS) (1997)
[5] Bellare, M.; Miner, S. K., A forward-secure digital signature scheme, Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, 431-448 (1999) · Zbl 0942.94026
[6] Boneh, D.; Boyen, X., Efficient selective-ID secure identity-based encryption without random oracles, (Cachin, C.; Camenisch, J., Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings. Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, Lecture Notes in Computer Science, 3027 (2004), Springer), 223-238 · Zbl 1122.94355
[7] Boneh, D.; Boyen, X., Short signatures without random oracles, (Cachin, C.; Camenisch, J. L., Advances in Cryptology - EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings (2004), Springer Berlin Heidelberg) · Zbl 1122.94354
[8] Boneh, D.; Boyen, X.; Goh, E., Hierarchical identity based encryption with constant size ciphertext, (Cramer, R., Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, Lecture Notes in Computer Science, 3494 (2005), Springer), 440-456 · Zbl 1137.94340
[9] Boneh, D.; Canetti, R.; Halevi, S.; Katz, J., Chosen-ciphertext security from identity-based encryption, SIAM J. Comput., 36, 5, 1301-1328 (2007) · Zbl 1138.94010
[10] Boneh, D.; Franklin, M. K., Identity-based encryption from the weil pairing, SIAM J. Comput., 32, 3, 586-615 (2003) · Zbl 1046.94008
[11] Boneh, D.; Hamburg, M., Generalized identity based and broadcast encryption schemes, Advances in Cryptology-ASIACRYPT 2008, 455-470 (2008), Springer · Zbl 1206.94054
[12] Boyen, X.; Shacham, H.; Shen, E.; Waters, B., Forward-secure signatures with untrusted update, Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30, - November 3, 2006, 191-200 (2006)
[13] Canetti, R.; Halevi, S.; Katz, J., A forward-secure public-key encryption scheme, (Biham, E., Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings. Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, Lecture Notes in Computer Science, 2656 (2003), Springer), 255-271 · Zbl 1037.68532
[14] Canetti, R.; Halevi, S.; Katz, J., Chosen-ciphertext security from identity-based encryption, Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, 207-222 (2004) · Zbl 1122.94358
[15] Cha, J. C.; Cheon, J. H., An identity-based signature from gap diffie-hellman groups, Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography. Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography, PKC ’03, 18-30 (2003), Springer-Verlag: Springer-Verlag London, UK · Zbl 1033.94554
[16] Chow, S. S.M.; Yiu, S.-M.; Hui, L. C.K., Efficient identity based ring signature, Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings, 499-512 (2005) · Zbl 1126.68389
[17] Cocks, C., An identity based encryption scheme based on quadratic residues, (Honary, B., Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings. Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings, Lecture Notes in Computer Science, 2260 (2001), Springer), 360-363 · Zbl 0999.94532
[18] Delerablée, C., Identity-based broadcast encryption with constant size ciphertexts and private keys, Advances in Cryptology-ASIACRYPT 2007, 200-215 (2007), Springer · Zbl 1153.94366
[19] Ebri, N. A.; Baek, J.; Shoufan, A.; Vu, Q. H., Forward-secure identity-based signature: new generic constructions and their applications, JoWUA, 4, 1, 32-54 (2013)
[20] Fiat, A.; Shamir, A., How to prove yourself: practical solutions to identification and signature problems, (Odlyzko, A. M., Advances in Cryptology - CRYPTO ’86, Santa Barbara, California, USA, 1986, Proceedings. Advances in Cryptology - CRYPTO ’86, Santa Barbara, California, USA, 1986, Proceedings, Lecture Notes in Computer Science, 263 (1986), Springer), 186-194
[21] Gentry, C.; Peikert, C.; Vaikuntanathan, V., Trapdoors for hard lattices and new cryptographic constructions, Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing. Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, STOC ’08, 197-206 (2008), ACM: ACM New York, NY, USA · Zbl 1231.68124
[22] Gentry, C.; Silverberg, A., Hierarchical ID-based cryptography, (Zheng, Y., Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings. Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, Lecture Notes in Computer Science, 2501 (2002), Springer), 548-566 · Zbl 1065.94547
[23] Hess, F., Efficient identity based signature schemes based on pairings, Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002 St. John’s, Newfoundland, Canada, August 15-16, 2002 Revised Papers, 310-324 (2003) · Zbl 1066.94554
[25] Itkis, G.; Reyzin, L., Forward-secure signatures with optimal signing and verifying, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, 332-354 (2001) · Zbl 1003.94532
[27] Kozlov, A.; Reyzin, L., Forward-secure signatures with fast key update, Security in Communication Networks: Third International Conference, SCN 2002 Amalfi, Italy, September 11-13, 2002 Revised Papers, 241-256 (2003) · Zbl 1022.68542
[28] Krawczyk, H., Simple forward-secure signatures from any signature scheme, CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000., 108-115 (2000)
[29] Libert, B.; Quisquater, J.; Yung, M., Forward-secure signatures in untrusted update environments: efficient and generic constructions, (Ning, P.; di Vimercati, S. D.; Syverson, P. F., Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007 (2007), ACM), 266-275
[30] Liu, Y.; Yin, X.; Qiu, L., ID-based forward-secure signature scheme from the bilinear pairings, (Yu, F.; Luo, Q.; Chen, Y.; Chen, Z., Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China (2008), IEEE Computer Society), 179-183
[31] Liu, Z.; Hu, Y.; Zhang, X.; Li, F., Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model, Sec. Commun. Netw., 6, 1, 69-77 (2013)
[32] Lyubashevsky, V., Lattice signatures without trapdoors, Advances in Cryptology - EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings, 738-755 (2012) · Zbl 1295.94111
[33] Malkin, T.; Micciancio, D.; Miner, S. K., Efficient generic forward-secure signatures with an unbounded number of time periods, Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, - May 2, 2002, Proceedings, 400-417 (2002) · Zbl 1056.94522
[34] Merkle, R. C., A digital signature based on a conventional encryption function, (Pomerance, C., Advances in Cryptology - CRYPTO ’87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings. Advances in Cryptology - CRYPTO ’87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings, Lecture Notes in Computer Science, 293 (1987), Springer), 369-378
[35] Paterson, K. G., ID-based signatures from pairings on elliptic curves, Electron. Lett., 38, 18, 1025-1026 (2002)
[36] Paterson, K. G.; Schuldt, J. C., Efficient identity-based signatures secure in the standard model, Proceedings of the 11th Australasian Conference on Information Security and Privacy, 207-222 (2006) · Zbl 1176.94056
[37] Rückert, M., Strongly unforgeable signatures and hierarchical identity-based signatures from lattices without random oracles, Post-Quantum Cryptography: Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings, 182-200 (2010) · Zbl 1286.94085
[38] Schnorr, C. P., Efficient identification and signatures for smart cards, Advances in Cryptology — EUROCRYPT ’89: Workshop on the Theory and Application of Cryptographic Techniques Houthalen, Belgium, April 10-13, 1989 Proceedings, 688-689 (1990) · Zbl 0722.68050
[39] Shamir, A., Identity-based cryptosystems and signature schemes, (Blakley, G. R.; Chaum, D., Advances in Cryptology, Proceedings of CRYPTO ’84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings. Advances in Cryptology, Proceedings of CRYPTO ’84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, Lecture Notes in Computer Science, 196 (1984), Springer), 47-53 · Zbl 1359.94626
[40] Tian, M.; Huang, L., Efficient identity-based signature from lattices, ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings, 321-329 (2014)
[41] Wang, D.; Cheng, H.; He, D.; Wang, P., On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices, IEEE Syst. J., PP, 99, 1-10 (2017)
[42] Waters, B., Efficient identity-based encryption without random oracles, Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings, 114-127 (2005) · Zbl 1137.94360
[43] Wei, J.; Liu, W.; Hu, X., Forward-secure identity-based signature with efficient revocation, Int. J. Comput. Math., 94, 7, 1390-1411 (2017) · Zbl 1421.94075
[44] Yao, D.; Fazio, N.; Dodis, Y.; Lysyanskaya, A., ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption, Proceedings of the ACM Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, CCS ’04, 354-363 (2004), ACM: ACM New York, NY, USA
[45] Yi, X., An identity-based signature scheme from the Weil pairing, IEEE Commun. Lett., 7, 2, 76-78 (2003)
[46] Yu, J.; Hao, R.; Kong, F.; Cheng, X.; Fan, J.; Chen, Y., Forward-secure identity-based signature: security notions and construction, Inf. Sci., 181, 3, 648-660 (2011) · Zbl 1204.94094
[47] Yu, J.; Kong, F.; Cheng, X.; Hao, R.; Li, G., One forward-secure signature scheme using bilinear maps and its applications, Inf. Sci. (Ny), 279, 60-76 (2014) · Zbl 1354.94061
[48] Yu, J.; Xia, H.; Zhao, H.; Hao, R.; Fu, Z.; Cheng, X., Forward-secure identity-based signature scheme in untrusted update environments, Wireless Pers. Commun., 86, 3, 1467-1491 (2016)
[49] Zhang, F.; Kim, K., ID-based blind signature and ring signature from pairings, Advances in Cryptology - ASIACRYPT 2002, 533-547 (2002), Springer Berlin Heidelberg · Zbl 1065.94566
[50] Zhang, X.; Xu, C.; Jin, C.; Xie, R., Efficient forward secure identity-based shorter signature from lattice, Comput. Electr. Eng., 40, 6, 1963-1971 (2014)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.