• 제목/요약/키워드: Identity-based signature

검색결과 87건 처리시간 0.022초

DNF 정책을 가지는 속성 기반 서명 (Attribute-Based Signatures with DNF Policies)

  • 이광수;황정연;김형중;이동훈
    • 전자공학회논문지CI
    • /
    • 제46권1호
    • /
    • pp.78-87
    • /
    • 2009
  • 속성 기반 서명(Attribute-Based Signature) 기법이란 서명자의 비밀키에 속성 집합(Attribute Set)이 연관되고 서명에 접근구조(Access Structure)가 연관되는 서명 기법이다. 속성 기반 서명 기법은 객체의 식별자가 속성 집합으로 표현되는 속성 기반 시스템(Attribute-Based System) 또는 권한 기반 시스템(Role-Based System)에서 서명자의 익명성과 접근 제어를 가능하게 하는 유용한 서명 기법이다. 본 논문에서는 속성 기반 서명 기법을 정의하고 서명에 포함되는 정책을 DNF(Disjunctive Normal Form) 수식으로 표현이 가능한 효율적인 속성 기반 서명 기법을 제시한다. 제시한 기법은 서명 검증시 상수번의 페어링 연산만이 필요한 최초의 안전한 기법이다. 그리고 증명이 가능한 속성 기반 서명 기법을 구성하기 위해서 새로운 interactive 가정을 소개하고 제안된 기법이 랜덤 오라클과 새로운 가정에서 안전함을 보인다.

A pairing-free key-insulated certificate-based signature scheme with provable security

  • Xiong, Hu;Wu, Shikun;Geng, Ji;Ahene, Emmanuel;Wu, Songyang;Qin, Zhiguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권3호
    • /
    • pp.1246-1259
    • /
    • 2015
  • Certificate-based signature (CBS) combines the advantages of both public key-based signature and identity-based signature, while saving from the disadvantages of drawbacks in both PKS and IBS. The insecure deployment of CBS under the hostile circumstances usually causes the exposure of signing key to be inescapable. To resist the threat of key leakage, we present a pairing-free key insulated CBS scheme by incorporating the idea of key insulated mechanism and CBS. Our scheme eliminates the costly pairing operations and as a matter of fact outperforms the existing key insulated CBS schemes. It is more suitable for low-power devices. Furthermore, the unforgeability of our scheme has been formally proven to rest on the discrete logarithm assumption in the random oracle model.

신원기반의 차량통신망 메시지 인증 스킴에 대한 안전성 분석 (Cryptanalysis of an Identity-Based Message Authentication Scheme in VANETs)

  • 류은경;이성운;유기영
    • 전자공학회논문지
    • /
    • 제50권6호
    • /
    • pp.167-172
    • /
    • 2013
  • 최근 Biswas등은 신원기반의 대리서명을 사용한 차량통신망 메시지 인증 프로토콜을 제안하였다. 저자들은 제안된 인증기법이 대리 서명키에 대한 안전성, 메시지 위조 및 재전송 공격에 대한 안전성, 부인방지 서비스, 대리 서명키 노출에 대한 저항성 등에 대한 안전성을 제공한다고 주장하였다. 본 논문에서는 Biswas등이 제안한 프로토콜에서 위임 받지 않은 임의의 공격자가 원 서명자의 비밀키에 대한 정보 없이 메시지 전달자의 대리 서명키를 계산할 수 있음을 보인다. 이것은 Biswas등이 제안한 메시지 인증 프로토콜은 저자들의 주장과는 달리 안전하지 않음을 의미한다. 또한, 본 논문에서는 이를 해결할 수 있는 개선된 프로토콜을 제시한다.

An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages

  • Yang, Haomiao;Kim, Hyunsung;Li, Hongwei;Yoon, Eunjun;Wang, Xiaofen;Ding, Xuefeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권10호
    • /
    • pp.2544-2560
    • /
    • 2013
  • As a cornerstone of the next generation air traffic management (ATM), automatic dependent surveillance-broadcast (ADS-B) system can provide continual broadcast of aircraft position, identity, velocity and other messages over unencrypted data links to generate a common situational awareness picture for ATM. However, since ADS-B messages are unauthenticated, it is easy to insert fake aircrafts into the system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, we propose an efficient broadcast authentication scheme with batch verification for ADS-B messages which employs an identity-based signature (IBS). Security analysis indicates that our scheme can achieve integrity and authenticity of ADS-B messages, batch verification, and resilience to key leakage. Performance evaluation demonstrates that our scheme is computationally efficient for the typical avionics devices with limited resources, and it has low communication overhead well suitable for low-bandwidth ADS-B data link.

Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group

  • Deng, Lunzhi;Yang, Yixian;Chen, Yuling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권11호
    • /
    • pp.5625-5641
    • /
    • 2017
  • Certificateless public key cryptography resolves the certificate management problem in traditional public key cryptography and the key escrow problem in identity-based cryptography. In recent years, some good results have been achieved in speeding up the computation of bilinear pairing. However, the computation cost of the pairing is much higher than that of the scalar multiplication over the elliptic curve group. Therefore, it is still significant to design cryptosystem without pairing operations. A multi-signer universal designated multi-verifier signature scheme allows a set of signers to cooperatively generate a public verifiable signature, the signature holder then can propose a new signature such that only the designated set of verifiers can verify it. Multi-signer universal designated multi-verifier signatures are suitable in many different practical applications such as electronic tenders, electronic voting and electronic auctions. In this paper, we propose a certificateless multi-signer universal designated multi-verifier signature scheme and prove the security in the random oracle model. Our scheme does not use pairing operation. To the best of our knowledge, our scheme is the first certificateless multi-signer universal designated multi-verifier signature scheme.

CLB-ECC: Certificateless Blind Signature Using ECC

  • Nayak, Sanjeet Kumar;Mohanty, Sujata;Majhi, Banshidhar
    • Journal of Information Processing Systems
    • /
    • 제13권4호
    • /
    • pp.970-986
    • /
    • 2017
  • Certificateless public key cryptography (CL-PKC) is a new benchmark in modern cryptography. It not only simplifies the certificate management problem of PKC, but also avoids the key escrow problem of the identity based cryptosystem (ID-PKC). In this article, we propose a certificateless blind signature protocol which is based on elliptic curve cryptography (CLB-ECC). The scheme is suitable for the wireless communication environment because of smaller parameter size. The proposed scheme is proven to be secure against attacks by two different kinds of adversaries. CLB-ECC is efficient in terms of computation compared to the other existing conventional schemes. CLB-ECC can withstand forgery attack, key only attack, and known message attack. An e-cash framework, which is based on CLB-ECC, has also been proposed. As a result, the proposed CLB-ECC scheme seems to be more effective for applying to real life applications like e-shopping, e-voting, etc., in handheld devices.

Research on Identity-based Batch Anonymous Authentication Scheme for VANET

  • Song, Cheng;Gu, Xinan;Wang, Lei;Liu, Zhizhong;Ping, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.6175-6189
    • /
    • 2019
  • To slove the security and efficiency problem of anonymous authentication in vehicular ad-hoc network (VANET), we adopt the bilinear pairing theory to propose an identity-based batch anonymous authentication scheme for VANET. The tamper-proof device in the on-board unit and the trusted authority jointly realize the anonymity of vehicle identity and the signature of messages, which further enhances the security of this scheme, as well as reduces the overhead of trusted authority. Batch authentication can improve the efficiency of anonymous authentication for VANET. Security and efficiency analyses demonstrate that this scheme not only satisfies such security properties as anonymity, non-forgeability and non-repudiation, but also has advantage in time and space complexity. Simulation results show that this scheme can achieve good performance in real-time VANET communication.

Provably Secure Certificate-Based Signcryption Scheme without Pairings

  • Lu, Yang;Li, Jiguo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권7호
    • /
    • pp.2554-2571
    • /
    • 2014
  • Certificate-based cryptography is a new cryptographic paradigm that provides an interesting balance between identity-based cryptography and traditional public key cryptography. It not only simplifies the complicated certificate management problem in traditional public key cryptography, but also eliminates the key escrow problem in identity-based cryptography. As an extension of the signcryption in certificate-based cryptography, certificate-based signcryption provides the functionalities of certificate-based encryption and certificate-based signature simultaneously. However, to the best of our knowledge, all constructions of certificate-based signcryption in the literature so far have to be based on the costly bilinear pairings. In this paper, we propose a certificate-based signcryption scheme that does not depend on the bilinear pairings. The proposed scheme is provably secure in the random oracle model. Due to avoiding the computationally-heavy paring operations, the proposed scheme significantly reduces the cost of computation and outperforms the previous certificate-based signcryption schemes.

An Identity-based Ring Signcryption Scheme: Evaluation for Wireless Sensor Networks

  • Sharma, Gaurav;Bala, Suman;Verma, Anil K.
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제2권2호
    • /
    • pp.57-66
    • /
    • 2013
  • Wireless Sensor Networks consist of small, inexpensive, low-powered sensor nodes that communicate with each other. To achieve a low communication cost in a resource constrained network, a novel concept of signcryption has been applied for secure communication. Signcryption enables a user to perform a digital signature for providing authenticity and public key encryption for providing message confidentiality simultaneously in a single logical step with a lower cost than that of the sign-then-encrypt approach. Ring signcryption maintains the signer's privacy, which is lacking in normal signcryption schemes. Signcryption can provide confidentiality and authenticity without revealing the user's identity of the ring. This paper presents the security notions and an evaluation of an ID-based ring signcryption scheme for wireless sensor networks. The scheme has been proven to be better than the existing schemes. The proposed scheme was found to be secure against adaptive chosen ciphertext ring attacks (IND-IDRSC-CCA2) and secure against an existential forgery for adaptive chosen message attacks (EF-IDRSC-ACMA). The proposed scheme was found to be more efficient than scheme for Wireless Sensor Networks reported by Qi. et al. based on the running time and energy consumption.

  • PDF

Bilinear 함수를 이용한 ID 기반 대리서명 기법 (ID-based Proxy Signature Scheme from the Bilinear Map)

  • 이정연;천정희;김태성;진승헌
    • 정보보호학회논문지
    • /
    • 제13권2호
    • /
    • pp.3-11
    • /
    • 2003
  • 대리서명은 원서명자가 대리인에게 서명 권한을 위임하여 대신 서명하게 하는 변형된 전자서명이다. 본 논문에서는 bilinear 함수를 이용한 ID 기반 인증 모델에서의 대리서명 기법을 제안한다. 기존에 제안된 ID 기반 인증 모델에서의 대리서명 기법은 대리인에 의한 오남용을 막을 수 없고, ID 기반 인증 모델에서의 대리서명임에도 불구하고 공개키 인증서가 필요하다. 하지만 우리가 제한하는 기법은 대리인의 서명권한을 규정한 위임장을 대리서명에 삽입함으로서 대리인에 의한 서명 권한의 오남용을 막을 수 있을 뿐만 아니라 공개키 인증서도 필요 없다. 효율성 측면에서, 제안하는 대리서명 기법은 서명 권한 위임 시 보안채널 설정의 필요성을 제거함으로써 기존의 대리서명보다 효율성을 훨씬 개선 할 수 있으며, ID 기반 인증모델에서의 공개키 습득과정의 단순화를 통한 효율성 향상이 가능하다