Efficient ID-Based Signature Scheme from Bilinear Map

We propose an identity (ID)-based signature scheme from bilinear map. The scheme is proved secure against existential forgery on adaptively chosen message and given ID attack in random oracle model under the Computational Diffie-Hellman (CDH) assumption. The new scheme is simple and computationally more efficient than other existing schemes. Furthermore, since the building blocks for proposed ID-based signature is the BLS short signature, hence in communications of ID-based signatures over low band width channels, the proposed scheme will be more economic and applicable.

[1]  Aggelos Kiayias,et al.  Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.

[2]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[3]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[4]  Zhu Wang,et al.  A Practical Identity-Based Signature Scheme from Bilinear Map , 2007, EUC Workshops.

[5]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[6]  A. Maximov,et al.  Fast computation of large distributions and its cryptographic applications , 2005 .

[7]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[8]  Aggelos Kiayias,et al.  Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.

[9]  Aggelos Kiayias,et al.  BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..

[10]  David Taniar,et al.  Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I , 2005, ICCSA.

[11]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[12]  Yvo Desmedt Public Key Cryptography — PKC 2003 , 2002, Lecture Notes in Computer Science.

[13]  S. D. Wolthusen Modeling Network Security Services in Tactical Networks , 2007 .

[14]  Colin Boyd,et al.  Advances in Cryptology - ASIACRYPT 2001 , 2001 .

[15]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[16]  Kenneth G. Paterson,et al.  ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..

[17]  Qiaoyan Wen,et al.  An Efficient Identity-Based Short Signature Scheme from Bilinear Pairings , 2007 .

[18]  Xun Yi,et al.  An identity-based signature scheme from the Weil pairing , 2003, IEEE Communications Letters.

[19]  M. Kasahara,et al.  A New Traitor Tracing , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[20]  Yi Mu,et al.  Emerging Directions in Embedded and Ubiquitous Computing , 2006 .

[21]  Jingmei Liu,et al.  Identity-Based Aggregate and Verifiably Encrypted Signatures from Bilinear Pairing , 2005, ICCSA.