Efficient Hierarchical Identity Based Signature in the Standard Model

نویسندگان

  • He Liu
  • Sijia Wang
  • Mangui Liang
چکیده

In this paper, we propose a new efficient hierarchical identity based signature (HIBS) scheme. Our scheme can be proven probably secure based on a natural hardness assumption (i.e. h-exponent computational diffie-hellman problem (h-CDH)) in the standard model. Our scheme only requires three pairing computations in verification, which has no relations with the hierarchy. Our scheme has constant signature size, and the length of a user's private key is shrinking as the depth increases. Most importantly, our scheme is non-public-verifiable. Only the specified recipient can verify the signature, which is very important for some private communications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model

Hierarchical identity-based signature (HIBS), which plays an important role in large communities, is a generalization of identity-based signature (IBS). In this paper, we present a new HIBS scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable against selective identity attacks under the standard hardness assumption of the short integer solution (SIS) ...

متن کامل

Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles

We propose a variant of the “bonsai tree” signature scheme, a lattice-based existentially unforgeable signature scheme in the standard model. Our construction offers the same efficiency as the “bonsai tree” scheme but supports the stronger notion of strong unforgeability. Strong unforgeability demands that the adversary is unable to produce a new message-signature pair (m, s), even if he or she...

متن کامل

Convertible limited (multi-) verifier signature: new constructions and applications

A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...

متن کامل

A New Construction of Short Hierarchical Identity-based Signature in the Standard Model

In this paper, a new short hierarchical identity-based signature (HIBS) scheme is proposed in the standard model. This scheme has some advantages over the available schemes: the private keys size shrinks as the identity depth increases and the signature size is constant as it consists of three group elements. Furthermore, under the generalization selective-identity security model, we reduce the...

متن کامل

Programmable Hash Functions in the Multilinear Setting

We adapt the concept of a programmable hash function (PHF, Crypto 2008) to a setting in which a multilinear map is available. This enables new PHFs with previously unachieved parameters. To demonstrate their usefulness, we show how our (standard-model) PHFs can replace random oracles in several well-known cryptographic constructions. Namely, we obtain standard-model versions of the BonehFrankli...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2007  شماره 

صفحات  -

تاریخ انتشار 2007