A tightly secure ID-based signature scheme under DL assumption in AGM

Identity-based signatures (IBS) can be verified using the signer identity information as the public key, and hence, there is no need for certificate management that proves the corresponding public key ownership. Unfortunately, none of the existing IBS schemes has security proven as tight as the disc...

Full description

Saved in:
Bibliographic Details
Main Authors: LOH, Jia-Chng, GUO, Fuchun, SUSILO, Willy, YANG, Guomin
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2023
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/8493
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-9496
record_format dspace
spelling sg-smu-ink.sis_research-94962024-01-04T04:18:03Z A tightly secure ID-based signature scheme under DL assumption in AGM LOH, Jia-Chng GUO, Fuchun SUSILO, Willy YANG, Guomin Identity-based signatures (IBS) can be verified using the signer identity information as the public key, and hence, there is no need for certificate management that proves the corresponding public key ownership. Unfortunately, none of the existing IBS schemes has security proven as tight as the discrete logarithm (DL) problem, the hardest problem in the cyclic group setting, under the standard EUF-CMA security model. Recently, the introduction of proving security in the algebraic group model (AGM), where the adversary’s computation is algebraic, enables some ordinary signature schemes to be proven tightly reducible under DL assumption and EUF-CMA. To date, however, it remains unknown whether IBS schemes can also be proven as secure as the DL problem in the AGM. Achieving tight security in IBS schemes under standard EUF-CMA is challenging, due to the need to take extra precautions against adaptive queries on user private keys by the adversary. In this work, we show, for the first time, an IBS scheme with tight security under DL assumption and EUF-CMA in the AGM. The scheme features a minimal signature size of two group elements, with a reduction loss factor of two. 2023-07-07T07:00:00Z text https://ink.library.smu.edu.sg/sis_research/8493 info:doi/10.1007/978-3-031-35486-1_10 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Identity-based signatures Provable security Tight reduction Algebraic group model Applied Mathematics Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Identity-based signatures
Provable security
Tight reduction
Algebraic group model
Applied Mathematics
Information Security
spellingShingle Identity-based signatures
Provable security
Tight reduction
Algebraic group model
Applied Mathematics
Information Security
LOH, Jia-Chng
GUO, Fuchun
SUSILO, Willy
YANG, Guomin
A tightly secure ID-based signature scheme under DL assumption in AGM
description Identity-based signatures (IBS) can be verified using the signer identity information as the public key, and hence, there is no need for certificate management that proves the corresponding public key ownership. Unfortunately, none of the existing IBS schemes has security proven as tight as the discrete logarithm (DL) problem, the hardest problem in the cyclic group setting, under the standard EUF-CMA security model. Recently, the introduction of proving security in the algebraic group model (AGM), where the adversary’s computation is algebraic, enables some ordinary signature schemes to be proven tightly reducible under DL assumption and EUF-CMA. To date, however, it remains unknown whether IBS schemes can also be proven as secure as the DL problem in the AGM. Achieving tight security in IBS schemes under standard EUF-CMA is challenging, due to the need to take extra precautions against adaptive queries on user private keys by the adversary. In this work, we show, for the first time, an IBS scheme with tight security under DL assumption and EUF-CMA in the AGM. The scheme features a minimal signature size of two group elements, with a reduction loss factor of two.
format text
author LOH, Jia-Chng
GUO, Fuchun
SUSILO, Willy
YANG, Guomin
author_facet LOH, Jia-Chng
GUO, Fuchun
SUSILO, Willy
YANG, Guomin
author_sort LOH, Jia-Chng
title A tightly secure ID-based signature scheme under DL assumption in AGM
title_short A tightly secure ID-based signature scheme under DL assumption in AGM
title_full A tightly secure ID-based signature scheme under DL assumption in AGM
title_fullStr A tightly secure ID-based signature scheme under DL assumption in AGM
title_full_unstemmed A tightly secure ID-based signature scheme under DL assumption in AGM
title_sort tightly secure id-based signature scheme under dl assumption in agm
publisher Institutional Knowledge at Singapore Management University
publishDate 2023
url https://ink.library.smu.edu.sg/sis_research/8493
_version_ 1787590779738259456