Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9

SM9 is a Chinese cryptography standard, which includes a set of identity-based cryptographic schemes over pairings. SM9 identity-based signature scheme (SM9-IBS) was standardized by ISO/IEC and has been widely used in many real-world applications such as blockchain. Nevertheless, the signing algorithm of SM9-IBS suffers from several heavy calculations (e.g. pairings, scalar multiplications in groups), which might be a bottleneck for lightweight devices such as sensors. In this paper, we modify the SM9-IBS scheme slightly to support fast signing. In order to achieve this, we make the use of online/offline methodology and propose a new online/offline IBS scheme based on SM9. The proposed scheme is proved to be EUF-sID-CMA secure and is about 99% faster than SM9-IBS in terms of signature generation. Precisely, the time cost of online signing is <1 ms. Our scheme is appropriate for the Internet of Things. The theoretical analysis and demonstration show that the proposed scheme is comparable to existing efficient online/offline IBS schemes.

[1]  Yimin Wang,et al.  An Efficient ID-based Online/Offline Signature Scheme without Key Escrow , 2017, Int. J. Netw. Secur..

[2]  Joonsang Baek,et al.  Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.

[3]  Wei Chen,et al.  An ID-based online/offline signature scheme without random oracles for wireless sensor networks , 2012, Personal and Ubiquitous Computing.

[4]  Chun-Ta Li,et al.  An efficient online/offline ID-based short signature procedure using extended chaotic maps , 2018, Soft Computing.

[5]  Javier Herranz,et al.  Deterministic Identity-Based Signatures for Partial Aggregation , 2006, Comput. J..

[6]  Peng Jiang,et al.  Identity-Based Broadcast Encryption for Inner Products , 2018, Comput. J..

[7]  Rui Zhang,et al.  Server-aided immediate and robust user revocation mechanism for SM9 , 2020, Cybersecurity.

[8]  Jacques Stern,et al.  Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.

[9]  Yunlei Zhao,et al.  Online/Offline Signatures for Low-Power Devices , 2013, IEEE Transactions on Information Forensics and Security.

[10]  Fei Wang,et al.  RKA Security for Identity-Based Signature Scheme , 2020, IEEE Access.

[11]  Jayaprakash Kar,et al.  Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network , 2014, Int. J. Netw. Secur..

[12]  Jun Hou,et al.  MHCOOS: An Offline-Online Certificateless Signature Scheme for M-Health Devices , 2020, Secur. Commun. Networks.

[13]  Fagen Li,et al.  Identity-based online/offline signcryption for low power devices , 2012, J. Netw. Comput. Appl..

[14]  Jian Weng,et al.  Scalable revocable identity-based signature over lattices in the standard model , 2020, Inf. Sci..

[15]  Fuchun Guo,et al.  Efficient identity-based online/offline encryption and signcryption with short ciphertext , 2017, International Journal of Information Security.

[16]  Kim-Kwang Raymond Choo,et al.  An Improved Online/Offline Identity-Based Signature Scheme for WSNs , 2016, Int. J. Netw. Secur..