Title: Versatile identity-based signatures for authentication in multi-user settings

Authors: Xi Sun; ZhengTao Jiang; MeiRong Zhou; Yumin Wang

Addresses: State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an 710071, China ' School of Computer Science, Communication University of China, Beijing 100024, China ' School of Computer Science, Communication University of China, Beijing 100024, China ' State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an 710071, China

Abstract: This paper proposes a new identity-based signature scheme. The new scheme is proven to be existentially unforgeable against Chosen-Principle and Chosen-Message (CP-CM) attackers who are the strongest attackers so far defined for identity-based signatures. The security of our scheme relies on the standard Computational Diffie-Hellman (CDH) assumption. The proof is given in the random oracle model where a hash function is modelled as random oracle. Analysis shows that our scheme is also more efficient than the state of the art in terms of computation and communication. We finally improve the basic scheme by eliminating the single-point problem, allow using as a proxy signature scheme and enable fast verification in multi-user settings. The basic scheme and its extensions show that our proposal is versatile to realise efficient and secure authentication in various scenarios.

Keywords: digital signatures; distributed networks; random oracle model; CP-CM security; provable security; multi-user authentication; identity-based signatures; proxy signature; network security.

DOI: 10.1504/IJGUC.2014.062905

International Journal of Grid and Utility Computing, 2014 Vol.5 No.3, pp.156 - 164

Received: 19 Dec 2012
Accepted: 20 Apr 2013

Published online: 29 Oct 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article