Paper Title:
New Constructions of Hierarchical Identity-Based Signature in the Standard Model
  Abstract

In this paper, a new construct of hierarchical identity-based signature(HIBS) scheme is proposed at first. It has many advantages over those available, such as fully secure without using random oracles, efficient signing algorithm. Additionally, it is provably secure under the computational Diffie-Hellman(CDH) assumption. This assumption is more natural than many of the hardness assumptions recently introduced to HIBS in the standard model. However, the length of its private key and signature increases as the hierarchy depth expands. Then a modified scheme is presented. The signature of modified scheme consists of three group elements and the private keys size shrinks as the identity depth increases. Under the h-CDH assumption, it is provable security in full security model without using random oracles.

  Info
Periodical
Key Engineering Materials (Volumes 474-476)
Edited by
Garry Zhu
Pages
1356-1361
DOI
10.4028/www.scientific.net/KEM.474-476.1356
Citation
Q. Wu, S. X. Sun, "New Constructions of Hierarchical Identity-Based Signature in the Standard Model", Key Engineering Materials, Vols. 474-476, pp. 1356-1361, 2011
Online since
April 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Le You Zhang, Qing Wu, Yu Pu Hu
Abstract:Using a biometric as an identity has the advantage that identities are unique if the underlying biometric is of a good quality, such as...
3350
Authors: Le You Zhang, Qing Wu, Yu Pu Hu
Chapter 3: Signal Processing
Abstract:Biometric measurements are noisy and the existing techniques cannot be used directly to construct biometric-based scheme. Hence an...
474
Authors: Qing Wu
Chapter 1: Mechatronics and Automation
Abstract:Using a biometric as an identity has the advantage that identities are unique if the underlying biometric is of a good quality, such as...
112
Authors: Bo Long Yang, Hao Guo
Chapter 4: Communication and Information Technologies
Abstract:Cloud computing is a new technology for complex systems shared among numerous users. Therefore, for the trust and security of the cloud...
173
Authors: Feng He Wang, Chun Xiao Wang
Chapter 4: Information Technologies, WEB and Networks Engineering, Information Security, Software Application and Development, E-Applications
Abstract:This paper proposes an identity-based signature (IBS) scheme over lattices. The proposed scheme is designed directly by combining the...
2169