scispace - formally typeset
Book ChapterDOI

ID-Based signature scheme without trusted PKG

Reads0
Chats0
TLDR
This work has presented the exact proof of security to demonstrate that the proposed ID-based signature scheme without trusted Private Key Generator (PKG) is secure against existential forgery on adaptively chosen messages and ID attacks assuming the complexity of Computational Diffie-Hellman (CDH) problem.
Abstract
Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest PKG can forge the signature of any user. On the other hand, the user can deny the signature actually signed by him/herself. To avoid the key escrow problem, we present an ID-based signature scheme without trusted Private Key Generator (PKG). We also presented the exact proof of security to demonstrate that our scheme is secure against existential forgery on adaptively chosen messages and ID attacks assuming the complexity of Computational Diffie-Hellman (CDH) problem. Compared with other signature schemes, the proposed scheme is more efficient.

read more

Citations
More filters
Proceedings ArticleDOI

CST: P2P Anonymous Authentication System Based on Collaboration Signature

TL;DR: This paper proposes a security architecture to ensure anonymity and authentication for honest users and keep traceability for misbehaving users in P2P systems and uses Collaboration Signature Trust (CST) to resolve the conflicts among anonymity, authentication and traceability.
Journal ArticleDOI

Modelling and Simulation of a Biometric Identity-Based Cryptography

TL;DR: The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology that can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance.
Proceedings ArticleDOI

ID-based designated - verifier proxy signature scheme without a trusted party

TL;DR: The security analysis shows that ID- based designated - verifier proxy signature scheme without trusted PKG is secure and effective and able to resist the forgery attack from PKG.
Journal ArticleDOI

Progress and Prospect of Some Fundamental Research on Information Security in China

TL;DR: Some of the reviewed work, including the researches on fundamental theory of cryptography, cryptographic algorithm, security protocol, security infrastructure and information hiding, greatly advances the related sub-fields, and is highly recognized in and outside of China.
Proceedings ArticleDOI

Improved Threshold Ring Signature for Ad-Hoc Group

TL;DR: The proposed scheme meets with the three requirements of threshold ring signature: correctness, anonymity and security against adaptively chosen message attacks in the random oracle model assuming the computational Diffie-Hellman problem (CDH problem) is hard to solve.
References
More filters
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Book ChapterDOI

Short Signatures from the Weil Pairing

TL;DR: A short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyperelliptic curves is introduced, designed for systems where signatures are typed in by a human or signatures are sent over a low-bandwidth channel.
Book ChapterDOI

Certificateless Public Key Cryptography

TL;DR: In this article, the concept of certificateless public key cryptography (CL-PKC) was introduced and made concrete, which does not require certificates to guarantee the authenticity of public keys.
Journal Article

Certificateless public key cryptography

TL;DR: In this article, the concept of certificateless public key cryptography (CL-PKC) was introduced and made concrete, which does not require certificates to guarantee the authenticity of public keys.
Book ChapterDOI

Polynomial reconstruction based cryptography

TL;DR: A short overview of recent works on the problem of Decoding Reed Solomon Codes (aka Polynomial Reconstruction) and the novel applications that were enabled due to this development.
Related Papers (5)