Detailed Information

Cited 0 time in webofscience Cited 1 time in scopus
Metadata Downloads

Tight security for the generic construction of identity-based signature (in the multi-instance setting)

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Youngkyung-
dc.contributor.authorPark, Jong Hwan-
dc.contributor.authorLee, Kwangsu-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-08-30T05:21:12Z-
dc.date.available2021-08-30T05:21:12Z-
dc.date.created2021-06-18-
dc.date.issued2020-12-22-
dc.identifier.issn0304-3975-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/50777-
dc.description.abstractAn identity-based signature (IBS) scheme can be generically constructed from any ordinary signature scheme by appending a chain of signatures. Until now, it has been known that a generic construction cannot lead to a tightly secure IBS scheme, although any tightly secure signature scheme can be used as a building block. In this study, we demonstrate that the generic construction of IBS can achieve tightness if the underlying signature scheme is tightly secure in the multi-user setting with corruption. In addition, we extend the tightness result of IBS to the multi-instance setting, where an adversary can corrupt multiple key generation centers and obtain multiple related master secret keys. As instantiations, we adopt the efficient and tightly secure signature scheme in the multiuser setting with corruption, recently proposed by Gjosteen and Jager (CRYPTO 2018). As a result, we can obtain the first efficient and tightly secure IBS schemes (in the multi-instance setting) based on the Diffie-Hellman assumptions in the random oracle model. (C) 2020 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER-
dc.subjectENCRYPTION-
dc.titleTight security for the generic construction of identity-based signature (in the multi-instance setting)-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1016/j.tcs.2020.09.044-
dc.identifier.scopusid2-s2.0-85092203724-
dc.identifier.wosid000588118200010-
dc.identifier.bibliographicCitationTHEORETICAL COMPUTER SCIENCE, v.847, pp.122 - 133-
dc.relation.isPartOfTHEORETICAL COMPUTER SCIENCE-
dc.citation.titleTHEORETICAL COMPUTER SCIENCE-
dc.citation.volume847-
dc.citation.startPage122-
dc.citation.endPage133-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusENCRYPTION-
dc.subject.keywordAuthorIdentity-based signature-
dc.subject.keywordAuthorTight security-
dc.subject.keywordAuthorMulti-instance setting-
dc.subject.keywordAuthorCDH-
dc.subject.keywordAuthorDDH-
dc.subject.keywordAuthorRandom oracle-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE