Tight security for the generic construction of identity-based signature (in the multi-instance setting)
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Youngkyung | - |
dc.contributor.author | Park, Jong Hwan | - |
dc.contributor.author | Lee, Kwangsu | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-08-30T05:21:12Z | - |
dc.date.available | 2021-08-30T05:21:12Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2020-12-22 | - |
dc.identifier.issn | 0304-3975 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/50777 | - |
dc.description.abstract | An identity-based signature (IBS) scheme can be generically constructed from any ordinary signature scheme by appending a chain of signatures. Until now, it has been known that a generic construction cannot lead to a tightly secure IBS scheme, although any tightly secure signature scheme can be used as a building block. In this study, we demonstrate that the generic construction of IBS can achieve tightness if the underlying signature scheme is tightly secure in the multi-user setting with corruption. In addition, we extend the tightness result of IBS to the multi-instance setting, where an adversary can corrupt multiple key generation centers and obtain multiple related master secret keys. As instantiations, we adopt the efficient and tightly secure signature scheme in the multiuser setting with corruption, recently proposed by Gjosteen and Jager (CRYPTO 2018). As a result, we can obtain the first efficient and tightly secure IBS schemes (in the multi-instance setting) based on the Diffie-Hellman assumptions in the random oracle model. (C) 2020 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER | - |
dc.subject | ENCRYPTION | - |
dc.title | Tight security for the generic construction of identity-based signature (in the multi-instance setting) | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1016/j.tcs.2020.09.044 | - |
dc.identifier.scopusid | 2-s2.0-85092203724 | - |
dc.identifier.wosid | 000588118200010 | - |
dc.identifier.bibliographicCitation | THEORETICAL COMPUTER SCIENCE, v.847, pp.122 - 133 | - |
dc.relation.isPartOf | THEORETICAL COMPUTER SCIENCE | - |
dc.citation.title | THEORETICAL COMPUTER SCIENCE | - |
dc.citation.volume | 847 | - |
dc.citation.startPage | 122 | - |
dc.citation.endPage | 133 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | ENCRYPTION | - |
dc.subject.keywordAuthor | Identity-based signature | - |
dc.subject.keywordAuthor | Tight security | - |
dc.subject.keywordAuthor | Multi-instance setting | - |
dc.subject.keywordAuthor | CDH | - |
dc.subject.keywordAuthor | DDH | - |
dc.subject.keywordAuthor | Random oracle | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.