ID-based signature without trusted PKG
PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2008-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74656165/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537551014297600 |
---|---|
author | ZHOU Liang1 LI Da-peng2 YANG Yi-xian1 |
author_facet | ZHOU Liang1 LI Da-peng2 YANG Yi-xian1 |
author_sort | ZHOU Liang1 |
collection | DOAJ |
description | PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery on adaptively chosen message and ID attack,assuming CDHP is intractable.The scheme not only is traceable that the arbiter can use Trace algorithm to de-tect deceiver but also eliminates the inherent key escrow problem.As compared with the typical signatures schemes to date,the proposed scheme achieves the higher efficiency. |
format | Article |
id | doaj-art-8417ad830a72403095d46f1fe8c93514 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2008-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-8417ad830a72403095d46f1fe8c935142025-01-14T08:32:34ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-0181274656165ID-based signature without trusted PKGZHOU Liang1LI Da-peng2YANG Yi-xian1PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery on adaptively chosen message and ID attack,assuming CDHP is intractable.The scheme not only is traceable that the arbiter can use Trace algorithm to de-tect deceiver but also eliminates the inherent key escrow problem.As compared with the typical signatures schemes to date,the proposed scheme achieves the higher efficiency.http://www.joconline.com.cn/zh/article/74656165/signatureID-based signaturebilinear pairingrandom oracle model |
spellingShingle | ZHOU Liang1 LI Da-peng2 YANG Yi-xian1 ID-based signature without trusted PKG Tongxin xuebao signature ID-based signature bilinear pairing random oracle model |
title | ID-based signature without trusted PKG |
title_full | ID-based signature without trusted PKG |
title_fullStr | ID-based signature without trusted PKG |
title_full_unstemmed | ID-based signature without trusted PKG |
title_short | ID-based signature without trusted PKG |
title_sort | id based signature without trusted pkg |
topic | signature ID-based signature bilinear pairing random oracle model |
url | http://www.joconline.com.cn/zh/article/74656165/ |
work_keys_str_mv | AT zhouliang1 idbasedsignaturewithouttrustedpkg AT lidapeng2 idbasedsignaturewithouttrustedpkg AT yangyixian1 idbasedsignaturewithouttrustedpkg |