Font Size: a A A

Research On Identity-Based Signature Scheme In The Standard Model

Posted on:2013-12-22Degree:DoctorType:Dissertation
Country:ChinaCandidate:K GuFull Text:PDF
GTID:1268330401479229Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
As an important technology of information security, digital signature may provide many services for other applications, which include identity authentication, data integrity protection, data non-repudiation and so on. Also, with the development of digital signature based on public key cryptography, key management has been an important basis for promoting the application of digital signature. Thus, based on identity-based cryptography, identity-based signature (IBS) is proposed. IBS is a variant of digital signature based on public key cryptography, which is a combination of digital signature and identity-based cryptography. Comparing with digital signature based on public key cryptography, IBS can simplify key management and be more easily used for many applications.Then, how to convert a public-key-based signature scheme to an identity-based signature scheme or construct a new identity-based signature scheme has been a hot research orientation. According to the current research about IBS, we focus on identity-based signature schemes and variant schemes in this paper, which include identity-based signature schemes, identity-based proxy signature schemes, identity-based multi-proxy signature schemes and attribute-based (fuzzy identity-based) signature schemes. Our works are as follows:(1)We show a more efficient identity-based signature scheme based on Paterson’s scheme in the standard model. The scheme improves computational efficiency by changing multiplicative operation to addition operation. Comparing with Paterson’s scheme, our scheme decreases the number of multiplicative operation. Also, comparing with other identity-based signature schemes in the standard model, our scheme is more efficient.(2)We present a framework for identity-based proxy signature (IBPS), and show a detailed security model for IBPS. Comparing with the existing security models for IBPS, we introduce Boldyreva’s model and Schuldt’s work to our security model. We further strengthen our security model by considering self-proxy signing and exposure arbitrary proxy signing keys. Also, we present a fully secure (adaptive-identity unforgeable) IBPS scheme in the standard model. Comparing with other IBPS schemes in the standard model, the proposed scheme decreases the computation cost.(3)Based on the existing security models for multi-proxy signature, we present a generalized signature framework and a complete security model for identity-based multi-proxy signature on n+1users, where n is the number of proxy signers participating in signing. In our security model, adversary’s ability is maximized. Also, Boldyreva’s model and Schuldt’s work are introduced to our security model. Additionally, a new identity-based multi-proxy signature scheme is proposed in the standard model, which is based on Paterson’s scheme. Then, based on the proposed identity-based multi-proxy signature scheme and its security model, we presenet an identity-based threshold-proxy signature scheme in the standard model and a corresponding security model.(4)We present a framework for attribute-based signature (ABS), which is based on Maji’s framework, and show a detailed security model for ABS. In our framework for ABS, we present a fully secure (adaptive-predicate unforgeable and perfectly private) ABS scheme for monotone predicates over access structure. Comparing with Maji’s third instantiation in the generic group model, the proposed scheme is constructed in the standard model and is efficient. Furthermore, comparing with the simple form of Okamoto’s scheme in the standard model, the proposed scheme is more efficient by employing more simple standard assumption and decreasing the computation cost.
Keywords/Search Tags:digital signature, identity-based cryptography, proxysignature, multi-proxy signature, threshold-proxy signature, attribute, standard model
PDF Full Text Request
Related items