A tightly secure ID-based signature scheme under DL assumption in AGM
Identity-based signatures (IBS) can be verified using the signer identity information as the public key, and hence, there is no need for certificate management that proves the corresponding public key ownership. Unfortunately, none of the existing IBS schemes has security proven as tight as the disc...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2023
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/8493 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-9496 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-94962024-01-04T04:18:03Z A tightly secure ID-based signature scheme under DL assumption in AGM LOH, Jia-Chng GUO, Fuchun SUSILO, Willy YANG, Guomin Identity-based signatures (IBS) can be verified using the signer identity information as the public key, and hence, there is no need for certificate management that proves the corresponding public key ownership. Unfortunately, none of the existing IBS schemes has security proven as tight as the discrete logarithm (DL) problem, the hardest problem in the cyclic group setting, under the standard EUF-CMA security model. Recently, the introduction of proving security in the algebraic group model (AGM), where the adversary’s computation is algebraic, enables some ordinary signature schemes to be proven tightly reducible under DL assumption and EUF-CMA. To date, however, it remains unknown whether IBS schemes can also be proven as secure as the DL problem in the AGM. Achieving tight security in IBS schemes under standard EUF-CMA is challenging, due to the need to take extra precautions against adaptive queries on user private keys by the adversary. In this work, we show, for the first time, an IBS scheme with tight security under DL assumption and EUF-CMA in the AGM. The scheme features a minimal signature size of two group elements, with a reduction loss factor of two. 2023-07-07T07:00:00Z text https://ink.library.smu.edu.sg/sis_research/8493 info:doi/10.1007/978-3-031-35486-1_10 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Identity-based signatures Provable security Tight reduction Algebraic group model Applied Mathematics Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Identity-based signatures Provable security Tight reduction Algebraic group model Applied Mathematics Information Security |
spellingShingle |
Identity-based signatures Provable security Tight reduction Algebraic group model Applied Mathematics Information Security LOH, Jia-Chng GUO, Fuchun SUSILO, Willy YANG, Guomin A tightly secure ID-based signature scheme under DL assumption in AGM |
description |
Identity-based signatures (IBS) can be verified using the signer identity information as the public key, and hence, there is no need for certificate management that proves the corresponding public key ownership. Unfortunately, none of the existing IBS schemes has security proven as tight as the discrete logarithm (DL) problem, the hardest problem in the cyclic group setting, under the standard EUF-CMA security model. Recently, the introduction of proving security in the algebraic group model (AGM), where the adversary’s computation is algebraic, enables some ordinary signature schemes to be proven tightly reducible under DL assumption and EUF-CMA. To date, however, it remains unknown whether IBS schemes can also be proven as secure as the DL problem in the AGM. Achieving tight security in IBS schemes under standard EUF-CMA is challenging, due to the need to take extra precautions against adaptive queries on user private keys by the adversary. In this work, we show, for the first time, an IBS scheme with tight security under DL assumption and EUF-CMA in the AGM. The scheme features a minimal signature size of two group elements, with a reduction loss factor of two. |
format |
text |
author |
LOH, Jia-Chng GUO, Fuchun SUSILO, Willy YANG, Guomin |
author_facet |
LOH, Jia-Chng GUO, Fuchun SUSILO, Willy YANG, Guomin |
author_sort |
LOH, Jia-Chng |
title |
A tightly secure ID-based signature scheme under DL assumption in AGM |
title_short |
A tightly secure ID-based signature scheme under DL assumption in AGM |
title_full |
A tightly secure ID-based signature scheme under DL assumption in AGM |
title_fullStr |
A tightly secure ID-based signature scheme under DL assumption in AGM |
title_full_unstemmed |
A tightly secure ID-based signature scheme under DL assumption in AGM |
title_sort |
tightly secure id-based signature scheme under dl assumption in agm |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2023 |
url |
https://ink.library.smu.edu.sg/sis_research/8493 |
_version_ |
1787590779738259456 |