Font Size: a A A

The Research And Design Of Leakage-Resilient Identity-based Signature Scheme

Posted on:2012-04-13Degree:MasterType:Thesis
Country:ChinaCandidate:F XiaFull Text:PDF
GTID:2218330368991850Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
The digital signature technology can provide users with data integrity, verifiability, resistance to denial and anti-counterfeiting security protections. As one of the core technology of information security, digital signature can work well in e-commerce, e-government, online banking and some other popular applications.The concept of identity-based cryptography was proposed by Shamir in 1984, and the first practical and efficient identity-based cryptosystem was presented by Boneh and Franklin in 2001. Since then, identity-based cryptography has become a hot topic of modern cryptography. In contrast with the widely used Public-Key Infrastructure, IBE weakens the use of public key. Instead, it uses identities to play the role of public keys. The system user needn't change its public key (ID) even if the private key is changed during its lifetime. Therefore it avoids the bottleneck problem of the third part of PKI scheme and digital certificate. In the identity-based environment, system can handle users'frequent joining and leaving requests conveniently, and the overhead of computation, storage and communication can be reduced.In this paper, we focused on the study of identity-based signature (IBS) schemes, especially the formalization of security model and the proofs based on the theory of provable security. We spent a lot of time on finding better schemes which can shorten the length of signature and public parameters, reduce the number of bilinear operations, improve the security of system, and provide tighter reduction. And we also tried to construct a new efficient IBS system based on the q-ABDHE assumption that can reduce the complexity of security model without compromising the performance of the system. Moreover, we also talked about the cases that system participants may suffer key leakage because of a variety of side-channel attacks or the uses'improper behavior in practical environment. Combined with the latest leakage resilient theories, we presented a fully secure IBS system which is resilient to bounded leakage from each of many secret keys per user, as well as many master keys. Finally, we realized our IBS scheme to verify its effectiveness.
Keywords/Search Tags:Standard Model, Identity-Based Signature, Dual System, Leakage Resilient
PDF Full Text Request
Related items