×

zbMATH — the first resource for mathematics

An efficient online/offline ID-based short signature procedure using extended chaotic maps. (English) Zbl 1415.94469
Summary: Chaos has been dealt with a decent approach to reduce computational complexity while fulfilling security necessities of a cryptographic techniques. In this article, we purpose an efficient online/offline ID-based short signature procedure based on extended chaotic maps and also demonstrated that it is protected under unforgeability of ID-based short signature under chosen message attack. Some of the intriguing arrangements of presented procedures is that it gives multi-time use of the offline stockpiling, which permits the signer to reuse the offline pre-administered information in polynomial time, rather than one-time use in all past online/offline signature procedures.

MSC:
94A62 Authentication, digital signatures and secret sharing
94A60 Cryptography
PDF BibTeX XML Cite
Full Text: DOI
References:
[1] Bellare, M.; Namprempre, C.; Neven, G., Security proofs for identity based identification and signature schemes, J Cryptol, 22, 1-61, (2009) · Zbl 1166.94008
[2] Boneh, D.; Boyen, X., Short signatures without random oracles the SDH assumption in bilinear groups, J Cryptol, 2, 149-177, (2008) · Zbl 1140.94373
[3] Cha J, Cheon J (2003) An identity-based signature from gap Diffie Hellman groups. In: Proceedings of PKC’2003. Lecture notes in computer science. Springer, Berlin, vol 2567, pp 18-30 · Zbl 1033.94554
[4] Chain, K.; Kuo, WC, A new digital signature scheme based on chaotic maps, Nonlinear Dyn, 74, 1003-1012, (2013) · Zbl 1284.94132
[5] Chen, G.; Mao, Y.; Chui, C., A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos Solitons Fractals, 21, 749-761, (2004) · Zbl 1049.94009
[6] Chen, G.; Chen, Y.; Liao, X., An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps, Chaos Solitons Fractals, 31, 571-579, (2007) · Zbl 1138.94354
[7] Chen X, Zhang F, Susilo W, Mu Y (2007b) Efficient generic online/offline signatures without key exposure. In: Proceedings of ACNS ’07. Lecture notes in computer science. Springer, Berlin, vol 4521, pp 18-30 · Zbl 1214.94061
[8] Dachselt, F.; Schwarz, W., Chaos and cryptography, IEEE Trans Circuits Syst I Fundam Theory Appl, 48, 1498-1509, (2001) · Zbl 0999.94030
[9] Deng, S.; Li, Y.; Xiao, D., Analysis and improvement of a chaos-based Hash function construction, Commun Nonlinear Sci Numer Simul, 15, 1338-1347, (2010) · Zbl 1221.94043
[10] Even S, Goldreich O, Micali S (1989) On-line/off-line digital signatures. In: Proceedings of CRYPTO ’89. Lecture notes in computer science. Springer, New York, vol 2442, pp 263-277 · Zbl 0844.94011
[11] Galindo D, Garcia F (2009) A schnorr-like lightweight identity-based signature scheme. In: Progress in cryptology-AFRICACRYPT 2009. Lecture notes in computer science. Springer, Berlin, vol 5580, pp 135-148 · Zbl 1246.94045
[12] Gao, Y.; Zeng, P.; Raymond Choo, KK; Song, F., An improved online/offline identity-based signature scheme for WSNs, Int J Netw Secur, 18, 1143-1151, (2016)
[13] Guillou LC, Quisquater JJ (1989) A “Paradoxical” identity-based signature scheme resulting from zero-knowledge. In: Proceedings of CRYPTO 88. Lecture notes in computer science. Springer, Berlin, vol 403, pp 216-231
[14] Han, S.; Chang, E., Chaotic map based key agreement without clock synchronization, Choas Soliton Fractals, 39, 1283-1289, (2009) · Zbl 1197.94190
[15] Herranz, J., Deterministic identity-based signatures for partial aggregation, Comput J, 49, 322-330, (2005)
[16] Hess F (2003) Efficient identity based signature schemes based on pairings. In: Selected area in cryptography, SAC2002. Lecture notes in computer science. Springer, Berlin, vol 2595, pp 310-324 · Zbl 1066.94554
[17] Joye M (2008) An efficient on-line/off-line signature scheme without random oracles. In: Proceedings of CANS ’08. Lecture notes in computer science. Springer, Berlin, vol 5339, pp 98-107 · Zbl 1300.94110
[18] Jye, S., A speech encryption using fractional chaotic systems, Nonlinear Dyn, 65, 103-108, (2011) · Zbl 1251.94013
[19] Kang, B.; Boyd, C.; Dawson, E., A novel identity-based strong designated verifier signature scheme, J Syst Softw, 82, 270-273, (2009)
[20] Kar, J., Provably secure online/off-line identity-based signature scheme for wireless sensor network, Int J Netw Secur, 16, 29-39, (2014)
[21] Kocarev, L., Chaos-based cryptography: a brief overview, IEEE Circuits Syst Mag, 1, 6-21, (2001)
[22] Kurosawa K, Schmidt-Samoa K (2006) New online/offline signature schemes without random oracles. In: Proceedings of PKC ’06. Lecture notes in computer science. Springer, Berlin, vol 3958, pp 330-346 · Zbl 1151.94531
[23] Lai, YM; Cheng, PJ; Lee, CC; Ku, CY, A new ticket-based authentication mechanism for fast handover in mesh network, PLoS ONE, 11, e0155064, (2016)
[24] Lee, CC; Hsu, CW, A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps, Nonlinear Dyn, 71, 201-211, (2013)
[25] Lee, CC; Chen, CL; Wu, CY; Huang, SY, An extended chaotic maps-based key agreement protocol with user anonymity, Nonlinear Dyn, 69, 79-87, (2012) · Zbl 1254.94038
[26] Lee, CC; Hsu, CW; Lai, YM; Vasilakos, AV, An enhanced mobile-healthcare emergency system based on extended chaotic maps, J Med Syst, 37, 9973, (2013)
[27] Lee, CC; Li, CT; Hsu, CW, A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps, Nonlinear Dyn, 73, 125-132, (2013) · Zbl 1281.94084
[28] Lee, CC; Li, CT; Chiu, ST; Lai, YM, A new three-party-authenticated key agreement scheme based on chaotic maps without password table, Nonlinear Dyn, 79, 2485-2495, (2014) · Zbl 1331.94061
[29] Lee, CC; Lou, DC; Li, CT; Hsu, CW, An extended chaotic-maps-based protocol with key agreement for multiserver environments, Nonlinear Dyn, 76, 853-866, (2014) · Zbl 1319.94076
[30] Li F, Shirase M, Takagi T (2008) On the security of online/offline signatures and multisignatures from acisp’06. In: Proceedings of CANS ’08. Lecture notes in computer science. Springer, Berlin, vol 5339, pp 108-119 · Zbl 1362.94038
[31] Li, CT; Lee, CC; Weng, CY, A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems, J Med Syst, 38, 77, (2014)
[32] Li, CT; Lee, CC; Weng, CY; Chen, SJ, A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems, J Med Syst, 40, 233, (2016)
[33] Mason JC, Handscomb DC (2003) Chebyshev polynomials. Chapman and Hall/CRC, Boca Raton · Zbl 1015.33001
[34] Meshram, C., An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem, Inf Process Lett, 115, 351-358, (2015) · Zbl 1320.94075
[35] Meshram, C., An efficient ID-based beta cryptosystem, Int J Secur Appl, 9, 189-202, (2015)
[36] Meshram, C.; Li, X., New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group, J Inf Optim Sci, 10, 1411013, (2017)
[37] Meshram, C.; Meshram, S., An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem, Inf Process Lett, 113, 375-380, (2013) · Zbl 1358.94071
[38] Meshram, C.; Meshram, SA, Constructing new An ID-based cryptosystem for IFP and GDLP based cryptosystem, J Discrete Math Sci Cryptogr, 20, 1121-1134, (2017)
[39] Meshram C, Obaidat MS (2015) An ID-based quadratic-exponentiation randomized cryptographic scheme. In: IEEE proceeding of international conference on computer, information and telecommunication systems, pp 1-5
[40] Meshram, C.; Powar, PL, An efficient identity-based QER cryptographic scheme, Complex Intell Syst, 2, 285-291, (2016)
[41] Meshram, C.; Meshram, S.; Zhang, M., An ID-based cryptographic mechanisms based on GDLP and IFP, Inf Process Lett, 112, 753-758, (2012) · Zbl 1250.94059
[42] Meshram, C.; Powar, PL; Obaidat, MS; Lee, CC, An IBE technique using partial discrete logarithm, Proc Comput Sci, 93, 735-741, (2016)
[43] Meshram, C.; Powar, PL; Obaidat, MS, An UF-IBSS-CMA protected online/offline identity-based short signature technique using PDL, Proc Comput Sci, 93, 847-853, (2016)
[44] Meshram, C.; Lee, CC; Li, CT; Chen, CL, A secure key authentication scheme for cryptosystems based on GDLP and IFP, Soft Comput, 21, 7285-7291, (2017)
[45] Meshram, C.; Tseng, YM; Lee, CC; Meshram, SG, An IND-ID-CPA secure ID-based cryptographic protocol using GDLP and IFP, Informatica, 28, 471-484, (2017) · Zbl 1398.94141
[46] Meshram C, Obaidat MS, Meshram SG (2017c) Chebyshev chaotic maps based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography. Secur Priv. https://doi.org/10.1002/spy2.12
[47] Selvi, SD; Sree, V.; Rangan, CP, Identity-based deterministic signature scheme without forking-lemma., Adv Inf Comput Secur, 7038, 79-95, (2011) · Zbl 1344.94084
[48] Shamir A, Tauman Y (2001) Improved online/offline signature schemes. In: Proceedings of CRYPTO ’01. Lecture notes in computer science. Springer, Berlin, vol 2139, pp 355-367 · Zbl 1003.94533
[49] Wang, Y.; Wong, K.; Liao, X.; Xiang, T., A block cipher with dynamic S-boxes based on tent map, Commun Nonlinear Sci Numer Simul, 14, 3089-3099, (2009) · Zbl 1221.94068
[50] Wang, X.; Yang, L.; Liu, R., A chaotic image encryption algorithm based on perceptron model, Nonlinear Dyn, 62, 615-621, (2010) · Zbl 1209.94015
[51] Wang, X.; Wang, X.; Zhao, J., Chaotic encryption algorithm based on alternant of stream cipher and block cipher, Nonlinear Dyn, 63, 587-597, (2011)
[52] Wong, KW, A fast chaotic cryptography scheme with dynamic look up table, Phys Lett A, 298, 238-242, (2002) · Zbl 0995.94029
[53] Xiao, D.; Shih, F.; Liao, X., A chaos-based hash function with both modification detection and localization capabilities, Commun Nonlinear Sci Numer Simul, 15, 2254-2261, (2010) · Zbl 1222.94040
[54] Xu S, Mu Y, Susilo W (2006) Online/offline signatures and multisignatures for AVOD and DSR routing security. In: Proceedings of ACISP ’06. Lecture notes in computer science. Springer, Berlin, vol 4058, pp 99-110 · Zbl 1176.94062
[55] Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems, Chaos, Solitons Fract, 37, 669-674, (2008) · Zbl 1134.94371
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.