ID-Based Forward-Secure Signature Scheme from the Bilinear Pairings

Based on the elliptic curve discrete logarithm problem of non-supersingular elliptic curve over finite field which has no efficient attack method by now, the paper proposes an ID-based forward-secure signature scheme from the bilinear pairings. The feature of the new scheme is that the secret key of different periods is associated with an identity and the signer just uses the current secret key with ID to sign the message, which is more desirable in practice. Another aspect of our results is that by presenting a new conception named correlative- parameter the proposed scheme establishes the connection between the signature for period i and the secret key of the same period. The detailed analysis of provable security in the random oracle model shows that the proposed scheme has the feature of correctness, forward-secure and resisting forging attack, which makes the whole signature scheme have certain theoretical and practical values.

[1]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[2]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[3]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[4]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[5]  Alfred Menezes,et al.  Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.

[6]  Leonid Reyzin,et al.  A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.

[7]  E. Mohammed,et al.  Elliptic curve cryptosystems on smart cards , 2002, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).

[8]  Mihir Bellare,et al.  A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.

[9]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[10]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[11]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[12]  Gerhard Frey,et al.  The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems , 1999, IEEE Trans. Inf. Theory.

[13]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[14]  Hugo Krawczyk,et al.  Simple forward-secure signatures from any signature scheme , 2000, IACR Cryptol. ePrint Arch..

[15]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[16]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[17]  Ross J. Anderson,et al.  Two remarks on public key cryptology , 2002 .