{"title":"An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser Settings","authors":"Xi Sun, Zhengtao Jiang, Meirong Zhou, Yumin Wang","doi":"10.1109/iNCoS.2012.87","DOIUrl":null,"url":null,"abstract":"Digital signature is a foundational cryptographic primitive in modern information systems. Identity-based signatures are advantageous over signatures in the conventional public key infrastructure setting. Observing that most information systems are implemented in a multi-user setting in which some users might be corrupted, this paper proposes a new identity-based signature scheme. The new scheme is proven to be existentially unforgeable against chosen-principle and chosen-message (CP-CM) attackers who are the strongest attackers so far defined for identity-based signatures. The security of our scheme relies on the standard computational Diffie-Hellman (CDH) assumption. The proof is given in the random oracle model where a hash function modeled as random oracle. Analysis shows that our scheme is also more efficient than the state of the art in terms of computation and communication. This implies that our proposal is practical to realize efficient and secure authentication in multi-user settings.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iNCoS.2012.87","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Digital signature is a foundational cryptographic primitive in modern information systems. Identity-based signatures are advantageous over signatures in the conventional public key infrastructure setting. Observing that most information systems are implemented in a multi-user setting in which some users might be corrupted, this paper proposes a new identity-based signature scheme. The new scheme is proven to be existentially unforgeable against chosen-principle and chosen-message (CP-CM) attackers who are the strongest attackers so far defined for identity-based signatures. The security of our scheme relies on the standard computational Diffie-Hellman (CDH) assumption. The proof is given in the random oracle model where a hash function modeled as random oracle. Analysis shows that our scheme is also more efficient than the state of the art in terms of computation and communication. This implies that our proposal is practical to realize efficient and secure authentication in multi-user settings.