Efficient Revocable ID-Based Signature With Cloud Revocation Server
نویسندگان
چکیده
منابع مشابه
An Efficient Proxy Signature Scheme with Revocation
A proxy signature allows a designated person, called a proxy signer, to sign the message on behalf of the original signer. Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. A number of proxy signature schemes have been proposed and succeeded for proxy delegations, but the schemes are in defective in proxy revocations. In this paper, we ...
متن کاملEfficient ID-Based Signature Scheme using Pairings
An ID-based cryptographic scheme enables the user to public keys without exchanging public key certificates. In these schemes, users can generate their public and private keys using their identity. The positive application of bilinear pairings over elliptic curves makes the system easy and efficient in providing security. In this paper, we propose an ID-based signature scheme using bilinear pai...
متن کاملSecure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
In this paper, we propose a new ID-based event-oriented linkable ring signature scheme, with an option as revocable-iff-linked. With this option, if a user generates two linkable ring signatures in the same event, everyone can compute his identity from these two signatures. We are the first in the literature to propose such a secure construction in ID-based setting. Even compared with other exi...
متن کاملAn Efficient Id-based Group Signature Scheme
We present an efficient group signature scheme which make use of elliptic curves identity-based signature scheme. The performance of the generated group signature scheme is similar to the performance of the underlying ID-based signature scheme.
متن کاملEfficient ID-based Signature Without Trusted PKG
In this paper, we introduce the exact concept of ID-based signature without trusted Private Key Generater(PKG), which solves the key escrow problem through binding two public key with a same identity. In this scheme, PKG is prevented from forging a legal user’s signature because he only generates the partially private key. Using Gap Diffie-Hellman (GDH) groups, we construct an efficient ID-base...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2017
ISSN: 2169-3536
DOI: 10.1109/access.2017.2676021