You are not logged in.

Efficient escrow-free identity-based signature

Zhang, Yunmei, Liu, Joseph K., Huang, Xinyi, Au, Man Ho and Susilo, Willy 2012, Efficient escrow-free identity-based signature. In Takagi, Tsuyoshi, Wang, Guilin, Qin, Zhiguang, Jiang, Shaoquan and Yu, Yong (ed), Provable security, Springer-Verlag, Berlin, Germany, pp.161-174, doi: 10.1007/978-3-642-33272-2_11.

Attached Files
Name Description MIMEType Size Downloads

Title Efficient escrow-free identity-based signature
Author(s) Zhang, Yunmei
Liu, Joseph K.
Huang, Xinyi
Au, Man Ho
Susilo, Willy
Title of book Provable security
Editor(s) Takagi, Tsuyoshi
Wang, Guilin
Qin, Zhiguang
Jiang, Shaoquan
Yu, Yong
Publication date 2012
Series Lecture Notes in Computer Science ; v.7496
Chapter number 11
Total chapters 21
Start page 161
End page 174
Total pages 14
Publisher Springer-Verlag
Place of Publication Berlin, Germany
Keyword(s) identity-based signature
key escrow
efficiency
practicality
Summary The notion of identity-based signature scheme (IBS) has been proven useful in some scenarios where relying on the validity of the certificates is impractical. Nevertheless, one remaining inherent problem that hinders the adoption of this cryptographic primitive in practice is due to the key escrow problem, where the private key generator (PKG) can always impersonate the user in the system. In 2010, Yuen et al. proposed the notion of IBS that does not suffer from the key escrow problem. Nevertheless, their approach relies on the judge who will later blame the malicious PKG when such a dispute occurs, assuming that the PKG is willing to collaborate. Although the approach is attractive, but unfortunately it is impractical since the malicious PKG may just refuse to collaborate when such an incident happens. In this paper, we propose a new escrow-free IBS, which enjoys three main advantages, namely key escrow free, practical and very efficient. We present a generic intuition as well as an efficient instantiation. In our approach, there is no judge involvement required, as the public can determine the malicious behaviour of PKG when such an incident happens. Further, the signature size of our instantiation is only two group elements, which outperforms the existing constructions in the literature.
ISBN 9783642332722
Language eng
DOI 10.1007/978-3-642-33272-2_11
Field of Research 109999 Technology not elsewhere classified
Socio Economic Objective 970110 Expanding Knowledge in Technology
HERDC Research category B1.1 Book chapter
Copyright notice ©2012, Springer
Persistent URL http://hdl.handle.net/10536/DRO/DU:30064134

Document type: Book Chapter
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 48 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Mon, 09 Jun 2014, 14:10:32 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.