On the generic construction of identitybased signatures with additional properties
Pages: 453  483,
Volume 4,
Issue 4,
November
2010
doi:10.3934/amc.2010.4.453 Abstract
References
Full text (448.7K)
Related Articles
David Galindo  University of Luxembourg, L1359, Luxembourg, Luxembourg (email)
Javier Herranz  Dept. Matemàtica Aplicada IV, Universitat Politècnica de Catalunya, Barcelona, 08034, Spain (email)
Eike Kiltz  RuhrUniversity Bochum, Bochum, D44780, Germany (email)
1 
IEEE P1363.3: Standard for identitybased cryptographic techniques using pairings. 

2 
M. Abdalla, C. Namprempre and G. Neven, On the (im)possibility of blind message authentication codes, in "Proceedings of CTRSA'06" (ed. D. Pointcheval), SpringerVerlag, (2006), 262279. 

3 
M. Abe and E. Fujisaki, How to date blind signatures, in "Proceedings of Asiacrypt'96" (eds. K. Kim and T. Matsumoto), SpringerVerlag, (1996), 244251. 

4 
M. Abe and T. Okamoto, Provably secure partially blind signatures, in "Proceedings of Crypto'00" (ed. M. Bellare), SpringerVerlag, (2000), 271286. 

5 
J. H. Ahn, M. Green and S. Hohenberger, Synchronized aggregate signatures: neew definitions, constructions and applications, in "Proceedings of CCS'10," to appear, ACM Press, (2010); available online at http://eprint.iacr.org/2010/422. 

6 
S. S. AlRiyami and K. G. Paterson, Certificateless public key cryptography, in "Proceedings of Asiacrypt'03" (ed. C.S. Laih), SpringerVerlag, (2003), 452473. 

7 
G. Ateniese and B. De Medeiros, Identitybased chameleon hash and applications, in "Proceedings of Financial Cryptography'04" (ed. A. Juels), SpringerVerlag, (2004), 164180. 

8 
J. Baek and Y. Zheng, Identitybased threshold signature scheme from the bilinear pairings, in "Proceedings of ITCC'04 (1)," IEEE Computer Society, (2004), 124128. 

9 
M. Bellare and S. K. Miner, A forwardsecure digital signature scheme, in "Proceedings of Crypto'99" (ed. M.J. Wiener), SpringerVerlag, (1999), 431448. 

10 
M. Bellare, C. Namprempre and G. Neven, Security proofs for identitybased identification and signature schemes, Journal of Cryptology, 22 (2009), 161. 

11 
M. Bellare, C. Namprempre, D. Pointcheval and M. Semanko, The onemorersainversion problems and the security of chaum's blind signature scheme, Journal of Cryptology, 16 (2003), 185215. 

12 
M. Bellare and P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in "Proceedings of CCS'93," ACM Press, (1993), 6273. 

13 
A. Boldyreva, Threshold signatures, multisignatures and blind signatures based on the gapdiffiehellmangroup signature scheme, in "Proceedings of PKC'03" (ed. Y. Desmedt), SpringerVerlag, (2002), 3146. 

14 
A. Boldyreva, C. Gentry, A. O'Neill and D. H. Yum, Ordered multisignatures and identitybased sequential aggregate signatures, with applications to secure routing, in "Proceedings of CCS'07" (eds. F. Bao and S. Miller), ACM Press, (2007), 276285. 

15 
A. Boldyreva, A. Palacio, and B. Warinschi, Secure proxy signature schemes for delegation of signing rights, Technical report, available online at http://eprint.iacr.org/2003/096. 

16 
D. Boneh and X. Boyen, Short signatures without random oracles and the SDH assumption in bilinear groups, Journal of Cryptology, 21 (2008), 149177. 

17 
D. Boneh and M. K. Franklin, Identity based encryption from the Weil pairing, SIAM Journal on Computing, 32 (2003), 586615. 

18 
D. Boneh, C. Gentry, B. Lynn and H. Shacham, Aggregate and verifiably encrypted signatures from bilinear maps, in "Proceedings of Eurocrypt'03" (ed. E. Biham), SpringerVerlag, (2003), 416432. 

19 
D. Boneh, B. Lynn and H. Shacham, Short signatures from the Weil pairing, Journal of Cryptology, 17 (2004), 297319. 

20 
J. Camenisch, M. Koprowski and B. Warinschi, Efficient blind signatures without random oracles, in "Proceedings of SCN'04" (eds. C. Blundo and S. Cimato), SpringerVerlag, (2004), 134148. 

21 
R. Canneti, O. Goldreich and S. Halevi, The random oracle methodology, revisited, Journal of the ACM, 51 (2004), 557594. 

22 
D. Chaum, Blind signatures for untraceable payments, in "Proceedings of Crypto'82" (eds. D. Chaum, R.L. Rivest and A.T. Sherman), Plenum Press, (1983), 199203. 

23 
D. Chaum, Designated confirmer signatures, in "Proceedings of Eurocrypt'94" (ed. A. De Santis), SpringerVerlag, (1995), 8691. 

24 
D. Chaum and H. Van Antwerpen, Undeniable signatures, in "Proceedings of Crypto'89" (ed. G. Brassard), SpringerVerlag, (1989), 212216. 

25 
X. Cheng, J. Liu and X. Wang, An identitybased signature and its threshold version, in "Proceedings of AINA'05," IEEE Computer Society, (2005), 973977. 

26 
X. Cheng, J. Liu and X. Wang, Identitybased aggregate and verifiably encrypted signatures from bilinear pairing, in "Proceedings of ICCSA'05 (IV)" (eds. O. Gervasi et al.), SpringerVerlag, (2005), 10461054. 

27 
S. S. M. Chow, L. C. K. Hui, S. M Yiu and K. P. Chow, Two improved partially blind signature schemes from bilinear pairings, in "Proceedings of ACISP'05" (eds. C. Boyd and J.M. González Nieto), SpringerVerlag, (2005), 316328. 

28 
I. Damgard, N. Fazio and A. Nicolosi, Noninteractive zeroknowledge from homomorphic encryption, in "Proceedings of TCC'06" (eds. S. Halevi and T. Rabin), SpringerVerlag, (2006), 4159. 

29 
I. Damgard and T. P. Pedersen, New convertible undeniable signature schemes, in "Proceedings of Eurocrypt'96" (ed. U.M. Maurer), SpringerVerlag, (1996), 372386. 

30 
Y. Dodis and J. Katz, Chosenciphertext security of multiple encryption, in "Proceedings of TCC'05" (ed. J. Kilian), SpringerVerlag, (2005), 188209. 

31 
Y. Dodis, J. Katz, S. Xu and M. Yung, Keyinsulated public key cryptosystems, in "Proceedings of Eurocrypt'02" (ed. L.R. Knudsen), SpringerVerlag, (2002), 6582. 

32 
S. Even, O. Goldreich and S. Micali, Online/offline digital signatures, Journal of Cryptology, 9 (1996), 3567. 

33 
M. Fischlin, Roundoptimal composable blind signatures in the common reference string model, in "Proceedings of Crypto'06" (ed. D. Dwork), SpringerVerlag, (2006), 6077. 

34 
S. Galbraith and W. Mao, Invisibility and anonymity of undeniable and confirmer signatures, in "Proceedings of CTRSA'03," (ed. M. Joye), SpringerVerlag, (2003), 8097. 

35 
C. Gentry and Z. Ramzan, Identitybased aggregate signatures, in "Proceedings of PKC'06" (eds. M. Yung, Y. Dodis, A. Kiayias and T. Malkin), SpringerVerlag, (2006), 257273. 

36 
C. Gentry and A. Silverberg, Hierarchical idbased cryptography, in "Proceedings of Asiacrypt'02" (ed. Y. Zheng), SpringerVerlag, (2002), 548566. 

37 
S. Goldwasser, S. Micali and R. L. Rivest, A digital signature scheme secure against adaptive chosenmessage attacks, SIAM Journal on Computing, 17 (1988), 281308. 

38 
S. Goldwasser and R. Ostrovsky, Invariant signatures and noninteractive zeroknowledge proofs are equivalent, in "Proceedings of Crypto'92" (ed. E.F. Brickell), SpringerVerlag, (1992), 228245. 

39 
C. Gu and Y. Zhu, An idbased verifiable encrypted signature scheme based on Hess's scheme, in "Proceedings of CISC'05" (eds. D. Feng, D. Lin and M. Yung), SpringerVerlag, (2005), 4252. 

40 
J. Herranz, Deterministic identitybased signatures for partial aggregation, The Computer Journal, 49 (2006), 322330. 

41 
B. C. Hu, D. S. Wong, Z. Zhang and X. Deng, Certificateless signature: a new security model and an improved generic construction, Designs, Codes and Cryptography, 42 (2007), 109126. 

42 
M. Jakobsson, K. Sako and R. Impagliazzo, Designated verifier proofs and their applications, in "Proceedings of Eurocrypt'96" (ed. U.M. Maurer), SpringerVerlag, (1996), 143154. 

43 
R. Johnson, D. Molnar, D. X. Song and D. Wagner, Homomorphic signature schemes, in "Proceedings of CTRSA'02" (ed. B. Preneel), SpringerVerlag, (2002), 244262. 

44 
A. Juels, M. Luby and R. Ostrovsky, Security of blind digital signatures, in "Proceedings of Crypto'97" (ed. B.S. Kaliski, Jr.), SpringerVerlag, (1997), 150164. 

45 
E. Kiltz, A. Mityagin, S. Panjwani and B. Raghava, Appendonly signatures, in "Proceedings of ICALP'05" (eds. L. Caires et al.), SpringerVerlag, (2005), 434445. 

46 
H. Krawczyk, Simple forwardsecure signatures from any signature scheme, in "Proceedings of CCS'00," ACM Press, (2000), 108115. 

47 
H. Krawczyk and T. Rabin, Chameleon signatures, in "Proceedings of NDSS'00," The Internet Society, (2000). 

48 
F. Laguillaumie and D. Vergnaud, Short undeniable signatures without random oracles: the missing link, in "Proceedings of Indocrypt'05" (eds. S. Maitra, C.E.V. Madhavan and R. Venkatesan), SpringerVerlag, (2005), 283296. 

49 
L. Lamport, Constructing digital signatures from a oneway function, Technical report, SRI International, (1979). 

50 
B. Libert and JJ. Quisquater, Identity based undeniable signatures, in "Proceedings of CTRSA'04" (ed. T. Okamoto), SpringerVerlag, (2004), 112125. 

51 
Y. Liu, X. Yin and L. Qiu, Idbased forwardsecure signature scheme from the bilinear pairings, in "Proceedings of International Symposium on Electronic Commerce and Security," IEEE Computer Society, (2008), 179183. 

52 
S. Lu, R. Ostrovsky, A. Sahai, H. Shacham and B. Waters, Sequential aggregate signatures and multisignatures without random oracles, in "Proceedings of Eurocrypt'06" (ed. S. Vaudenay), SpringerVerlag, (2006), 465485. 

53 
A. Lysyanskaya, Unique signatures and verifiable random functions from the dhddh separation, in "Proceedings of Crypto'02" (ed. M. Yung), SpringerVerlag, (2002), 597612. 

54 
A. Lysyanskaya, S. Micali, L. Reyzin and H. Shacham, Sequential aggregate signatures from trapdoor permutations, in "Proceedings of Eurocrypt'04" (eds. C. Cachin and J. Camenisch), SpringerVerlag, (2004), 7490. 

55 
M. Mambo, K. Usuda and E. Okamoto, Proxy signatures: delegation of the power to sign messages, IEICE Trans. Fundamentals, E79A (1996), 13381353. 

56 
G. Neven, Efficient sequential aggregate signed data, in "Proceedings of Eurocrypt'08" (ed. N.P. Smart), SpringerVerlag, (2008), 5269. 

57 
T. Okamoto, Efficient blind and partially blind signatures without random oracles, in "Proceedings of TCC'06" (eds. S. Halevi and T. Rabin), SpringerVerlag, (2006), 8099. 

58 
L. T. Phong and W. Ogata, New identitybased blind signature and blind decryption scheme in the standard model, IEICE Trans. Fundamentals, E92A (2009), 18221835. 

59 
D. Pointcheval and J. Stern, Security arguments for digital signatures and blind signatures, Journal of Cryptology, 13 (2000), 361396. 

60 
R. Rivest, A. Shamir and Y. Tauman, How to leak a secret, in "Proceedings of Asiacrypt'01" (ed. C. Boyd), SpringerVerlag, (2001), 552565. 

61 
R. Sakai, K. Ohgishi and M. Kasahara, Cryptosystems based on pairings, in "Proceedings of Symposium on Cryptography and Information Security, SCIS 2000 (Japan)," (2000). 

62 
A. Shamir, Identitybased cryptosystems and signature schemes, in "Proceedings of Crypto'84" (eds. G.R. Blakley and D. Chaum), SpringerVerlag, (1985), 4753. 

63 
A. Shamir and Y. Tauman, Improved online/offline signature schemes, in "Proceedings of Crypto'01" (ed. J. Kilian), SpringerVerlag, (2001), 355367. 

64 
W. Susilo, F. Zhang and Y. Mu, Identitybased strong designated verifier signature schemes, in "Proceedings of ACISP'04" (eds. H. Wang, J. Pieprzyk and V. Varadharajan), SpringerVerlag, (2004), 313324. 

65 
W. Susilo, F. Zhang and Y. Mu, On the security of nominative signatures, in "Proceedings of ACISP'05" (eds. C. Boyd and J.M. González Nieto), SpringerVerlag, (2005), 329335. 

66 
G. Wang, W. Gao, X. Wang and F. Li, Oneround idbased blind signature scheme without ROS assumption, in "Proceedings of Pairing'08" (eds. S.D. Galbraith and K.G. Paterson), SpringerVerlag, (2008), 316331. 

67 
J. Weng, S. Liu, K. Chen and X. Li, Identitybased keyinsulated signature with secure keyupdates, in "Proceedings of Inscrypt'06" (eds. H. Lipmaa, M. Yung and D. Lin), SpringerVerlag, (2006), 1326. 

68 
J. Xu, Z. Zhang and D. Feng, IDbased proxy signature using bilinear pairings, in "Proceedings of ISPA'05" (eds. G. Chen, Y. Pan, M. Guo and J. Lu), SpringerVerlag, (2005), 359367. 

69 
S. Xu, Y. Mu and W. Susilo, Efficient authentication scheme for routing in mobile ad hoc networks, in "Proceedings of EUC Workshops'05" (eds. T. Enokido et al.), SpringerVerlag, (2005), 854863. 

70 
F. Zhang and K. Kim, Idbased blind signature and ring signature from pairings, in "Proceedings of Asiacrypt'02" (ed. Y. Zheng), SpringerVerlag, (2002), 533547. 

71 
F. Zhang and K. Kim, Efficient IDbased blind signature and proxy signature from bilinear pairings, in "Proceedings of ACISP'03" (eds. R. SafaviNaini and J. Seberry), SpringerVerlag, (2003), 312323. 

72 
Y. Zhou, Z. Cao and Z. Chai, Identity based key insulated signature, in "Proceedings of ISPEC'06" (eds. K. Chen, R.H. Deng, X. Lai and J. Zhou), SpringerVerlag, (2006), 226234. 

Go to top
