×

Efficient ID-based key-insulated signature scheme with batch verifications using bilinear pairings over elliptic curves. (English) Zbl 1495.94080

MSC:

94A62 Authentication, digital signatures and secret sharing
94A60 Cryptography
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] An, J. H.; Dodis, Y.; Rabin, T., On the security of joint signature and encryption, Advances In Cryptology, 83-107 (2002), Springer-Verlag · Zbl 1055.94511
[2] Anderson, R., Two remarks on public key cryptology, Invited Lecture, ACM-CCS’97
[3] Barreto, P. L.M.; Kim, H.; Lyn, B.; Scott, M., Efficient algorithms for pairing based cryptosystems, 354-368 (2002), Springer-Verlag · Zbl 1026.94520
[4] Bellare, M.; Miner, S., A forward-secure digital signature scheme, LNCS, 1666, 431-448 (2003), Springer-Verlag · Zbl 0942.94026
[5] Bellare, M.; Polacio, A., Protecting against key-exposure: Strong key-insulated encryption with optimal threshold, Applicable Algebra in Engineering, Communication and Computing, 16, 379-396 (2006) · Zbl 1098.94020
[6] Boneh, D.; Franklin, M., Identity based encryption from the Weil pairing, Advances in Cryptology-Crypto ’01, 213-229 (2001), Springer-Verlag · Zbl 1002.94023
[7] Cha, J. C.; Cheon, J. H., An identity-based signature scheme from Gap Diffie-Hellman groups, Proc. of PKC 2003, 18-30 (2003), Springer-Verlag, LNCS 2567 · Zbl 1033.94554
[8] Desmedt, Y.; Frankel, Y., Threshold cryptosystems, Crypto’89, LNCS, 435, 307-315 (1989), Springer-Verlag
[9] Dodis, Y.; Katz, J.; Xu, S.; Yung, M., Key-insulated public key cryptosystems, In Proc. of Advances in Cryptology, Vol. 2332, 65-82 (2002), LNCS, Springer-Verlag · Zbl 1055.94012
[10] Dodis, Y.; Katz, J.; Xu, S.; Yung, M., Strong key-insulated signature schemes, 2567, 130-144 (2003), LNCS, Springer-Verlag · Zbl 1033.94555
[11] Goh, E. J.; Jarecki, S., A signature scheme as secure as the Diffie-Hellman problem, LNCS 2656, 401-415 (2003), Springer · Zbl 1038.94556
[12] González-Deleito, N.; Markowitch, O.; Dall’Olio, E., A new key-insulated signature scheme, LNCS 3269, 465-479 (2004), Springer-Verlag · Zbl 1109.94345
[13] Gopal, P. V.S. S.N.; Vasudeva Reddy, P.; Gowri, T., New identity based signature scheme using bilinear pairings over elliptic curves, 3rd IEEE International Advanced Computing Conference-2013, 362-367 (2012)
[14] Hanaoka, G.; Hanaoka, Y.; Imai, H., Parallel key-insulated public key encryption, LNCS, 3958, 105-122 (2006) · Zbl 1151.94515
[15] Hanaoka, Y.; Hanaoka, G.; Shikata, J.; Imai, H., Identity-based hierarchical strongly key-insulated encryption and its application, LNCS, 3788, 495-514 (2005) · Zbl 1154.94393
[16] Hess, F., Efficient identity based signature schemes based on pairings, LNCS 2595, 310-324 (2002), Springer-Verlag · Zbl 1066.94554
[17] Katz, J.; Wang, N., Efficiency improvements for signature schemes with tight security reductions, In Proc. of the 10th ACM Conference on CCS, 155-164 (2003)
[18] Ostrovsky, R.; Yung, M., How to withstand mobile virus attacks, PODC’91, ACM, 51-59 (1991) · Zbl 1314.68132
[19] Paterson, K. G., ID-based signatures from pairings on elliptic curves, IEEE Electronic Letters, 38, 18, 1025-1026 (2002)
[20] Pointcheval, D.; Stern, J., Security arguments for digital signatures and blind signatures, Journal of Cryptology, 13, 3, 361-396 (2000) · Zbl 1025.94015
[21] Shamir, A., How to share a secret, Comm. of the ACM, 22, 11, 612-613 (1979) · Zbl 0414.94021
[22] Shamir, A., Identity-based Cryptosystems and Signature Schemes, LNCS 196, Springer-Verlag, 47-53 (1985) · Zbl 1359.94626
[23] Wang, J.; Wu, Q.; Wang, Y., A new perfect and strong key-insulated signature scheme, In Proc. of China Crypt’2004, 233-239 (2004)
[24] Weng, J.; Li, X.; Chen, K.; Liu, S., Identity-based parallel key-insulated signature without random oracles, Journal of Information Science and Engineering, 24, 4, 1143-1157 (2008)
[25] Weng, J.; Liu, S.; Chen, K., Identity-based parallel key-insulated signature: Framework and construction, Journal of Research and Practice in Information Technology, 40, 1, 55-68 (2008)
[26] Weng, J.; Liu, S.; Chen, K.; Li, X., Identity-based key-insulated signature with secure key-updates, LNCS 1318, 13-26 (2006), Springer-Verlag · Zbl 1172.94629
[27] Wu, T. Y.; Tseng, Y. M.; Yu, C. W., ID-based key-insulated signature scheme with batch verifications and its novel application, International Journal of Innovative Computing, Information and Control, 8, 7, 4797-4810 (2012)
[28] Zhou, Y.; Cao, Z.; Chai, Z., Identity based key-insulated signature, LNCS 3903, 226-234 (2006), Springer-Verlag
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.