ID-based signature without trusted PKG

PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHOU Liang1, LI Da-peng2, YANG Yi-xian1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2008-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74656165/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537551014297600
author ZHOU Liang1
LI Da-peng2
YANG Yi-xian1
author_facet ZHOU Liang1
LI Da-peng2
YANG Yi-xian1
author_sort ZHOU Liang1
collection DOAJ
description PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery on adaptively chosen message and ID attack,assuming CDHP is intractable.The scheme not only is traceable that the arbiter can use Trace algorithm to de-tect deceiver but also eliminates the inherent key escrow problem.As compared with the typical signatures schemes to date,the proposed scheme achieves the higher efficiency.
format Article
id doaj-art-8417ad830a72403095d46f1fe8c93514
institution Kabale University
issn 1000-436X
language zho
publishDate 2008-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-8417ad830a72403095d46f1fe8c935142025-01-14T08:32:34ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-0181274656165ID-based signature without trusted PKGZHOU Liang1LI Da-peng2YANG Yi-xian1PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery on adaptively chosen message and ID attack,assuming CDHP is intractable.The scheme not only is traceable that the arbiter can use Trace algorithm to de-tect deceiver but also eliminates the inherent key escrow problem.As compared with the typical signatures schemes to date,the proposed scheme achieves the higher efficiency.http://www.joconline.com.cn/zh/article/74656165/signatureID-based signaturebilinear pairingrandom oracle model
spellingShingle ZHOU Liang1
LI Da-peng2
YANG Yi-xian1
ID-based signature without trusted PKG
Tongxin xuebao
signature
ID-based signature
bilinear pairing
random oracle model
title ID-based signature without trusted PKG
title_full ID-based signature without trusted PKG
title_fullStr ID-based signature without trusted PKG
title_full_unstemmed ID-based signature without trusted PKG
title_short ID-based signature without trusted PKG
title_sort id based signature without trusted pkg
topic signature
ID-based signature
bilinear pairing
random oracle model
url http://www.joconline.com.cn/zh/article/74656165/
work_keys_str_mv AT zhouliang1 idbasedsignaturewithouttrustedpkg
AT lidapeng2 idbasedsignaturewithouttrustedpkg
AT yangyixian1 idbasedsignaturewithouttrustedpkg