Filters








323,059 Hits in 2.8 sec

Efficient Identity-Based Signatures Secure in the Standard Model [chapter]

Kenneth G. Paterson, Jacob C. N. Schuldt
2006 Lecture Notes in Computer Science  
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based signatures.  ...  The scheme's security is proven in the standard model and rests on the hardness of the computational Diffie-Hellman problem in groups equipped with a pairing.  ...  Acknowledgment We thank Jonathan Katz, Eike Kiltz and an anonymous reviewer for pointing out the folklore certification-based construction for identity-based signatures.  ... 
doi:10.1007/11780656_18 fatcat:5f2ihxbu6jaxtfc6ixc3imby3e

Secure Short Hierarchical Identity-Based Signature in the Standard Model

Leyou Zhang, Yupu Hu, Qing Wu, Xu'an Tian
2010 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing  
In this paper, a new short hierarchical identity-based signature (HIBS) scheme is proposed in the standard model.  ...  This assumption is more natural than many of the hardness assumptions recently introduced to HIBS in the standard model  ...  The new scheme is constructed in the standard model and has a constant-size signature.  ... 
doi:10.1109/nswctc.2010.90 fatcat:gaampqkcsrepjcnu2eepohewse

A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

Lili Zhang, Yanqin Ma
2014 Mathematical Problems in Engineering  
To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.  ...  In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles.  ...  A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model We introduce our lattice-based identity-based proxy blind signature scheme in the standard model in this section which  ... 
doi:10.1155/2014/307637 fatcat:lx7wvv2bxzgh3ilz6egqreytw4

Identity-Based Ring Signature Scheme with Constant Size Signatures in the Standard Model

Ai-Jun GE, Chuan-Gui MA, Zhen-Feng ZHANG, Shao-Zhen CHEN
2012 Chinese Journal of Computers  
doi:10.3724/sp.j.1016.2012.01874 fatcat:cmf6oegfsnah5bbsmbl4tzedsq

Adaptive-ID Secure Identity-Based Signature Scheme from Lattices in the Standard Model

Zecheng Wang, Xuemin Chen, Pingshui Wang
2017 IEEE Access  
Index Terms-Adaptive identity, identity-based signature, lattice, security, standard model.  ...  Identity-based signature (IBS) which is a paradigm built on public key cryptography has played a significant role in light-weight authentication.  ...  THE NEW IDENTITY-BASED SIGNATURE SCHEME A.  ... 
doi:10.1109/access.2017.2757464 fatcat:f7ueeffjmjf3pcawzci2mnpeli

A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model

Chunli Yang, Shihui Zheng, Licheng Wang, Miaomiao Tian, Lize Gu, Yixian Yang
2014 Mathematical Problems in Engineering  
the standard model.  ...  A fuzzy identity-based signature (FIBS) scheme allows a user with identityIDto issue a signature that could be verified with identityID'if and only ifIDandID'lie within a certain distance.  ...  (SU-sID-CMA) in the standard model.  ... 
doi:10.1155/2014/391276 fatcat:54ykvzfbjvcklf2iwz76zvvwfm

Efficient identity-based threshold signature scheme from bilinear pairings in standard model

Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang
2014 International Journal of Internet Protocol Technology  
It is proved secure with optimal resilience in the standard model.  ...  We propose a new identity-based threshold signature (IBTHS) scheme from bilinear pairings enjoying the following advantages in efficiency, security and functionality.  ...  Theorem 1 The Paterson-Schuldt identity-based signature scheme is (t, q e , q s , t) unforgeable against adaptive chosen identity and message attack in the standard model, assuming that the CDH problem  ... 
doi:10.1504/ijipt.2014.066373 fatcat:s7c63jqjsjcmldux77z6v4gpsy

Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions

Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek, Partha Sarathi Roy
2020 Journal of Internet Services and Information Security  
In this paper, we provide, for the first time, concrete constructions of unidirectional IB-PRE and IB-PRS which are secure in standard model based on the hardness of learning with error problem and small  ...  Unfortunately, till today, there is no unidirectional IB-PRE and IB-PRS secure in the standard model, which can withstand quantum attack.  ...  Further, they proposed unidirectional identity-based PRE [34] , termed as IB-uPRE, secure in the random oracle model.  ... 
doi:10.22667/jisis.2020.11.30.001 dblp:journals/jisis/DuttaSDBR20 fatcat:2ewtz635rrchtfnckdi2ypurdy

On the generic construction of identity-based signatures with additional properties

Eike Kiltz, Javier Herranz, David Galindo
2010 Advances in Mathematics of Communications  
In particular, our work implies the existence of identity-based signatures with additional properties that are provably secure in the standard model, do not need bilinear pairings, or can be based on general  ...  In this paper we consider the following natural extension: is there a generic construction of "identity-based signature schemes with additional properties" (such as identity-based blind signatures, verifiably  ...  An efficient VES scheme in the random oracle model based on pairings was given in [7] , one in the standard model in [25] .  ... 
doi:10.3934/amc.2010.4.453 fatcat:zpdvgtqncvdcpiwjqzox3723ei

Strong Identity-Based Proxy Signature Schemes, Revisited

Weiwei Liu, Yi Mu, Guomin Yang, Yangguang Tian
2018 Wireless Communications and Mobile Computing  
We demonstrate this attack by launching it against an identity-based proxy signature scheme which is proven secure. We then propose one method that can effectively prevent this attack.  ...  There have been lots of works in constructing efficient and secure proxy signature schemes.  ...  Security Model for Proxy Signature Malicious Attackers. We revise the security model for identity-based proxy signature defined in [13] to capture the new attack in this section.  ... 
doi:10.1155/2018/6925019 fatcat:qry5pgjyzvbevjgn2kwsqswd34

On the Generic Construction of Identity-Based Signatures with Additional Properties [chapter]

David Galindo, Javier Herranz, Eike Kiltz
2006 Lecture Notes in Computer Science  
In particular, our work implies the existence of identity-based signatures with additional properties that are provably secure in the standard model, do not need bilinear pairings, or can be based on general  ...  In this paper we consider the following natural extension: is there a generic construction of "identity-based signature schemes with additional properties" (such as identity-based blind signatures, verifiably  ...  An efficient VES scheme in the random oracle model based on pairings was given in [7] , one in the standard model in [25] .  ... 
doi:10.1007/11935230_12 fatcat:xmzndw3plzhqhbk4ryc5g6wb34

New Identity-based Short Signature Without Random Oracles

Leyou Zhang, Yupu Hu, Qing Wu
2011 Procedia Engineering  
A new identity-based short signature(IBS) is proposed in this paper. The new scheme is constructed in the standard model and has short public parameters and private keys.  ...  In addition, the size of the signature achieves 320 bits, which is much more efficient than the existing IBS schemes.  ...  Efficiency : The well known identity-based signature in the standard model is issued by Paterson [17] . But it's signature size is 480 bits. The size of our scheme achieves 320 bits.  ... 
doi:10.1016/j.proeng.2011.08.645 fatcat:owiyzbfvxrgzxb2pxgvfec7opy

An Intelligence Information System based on Service-Oriented Architecture: A Survey of Security Issues

Jugoslav Achkoski, Metodija Dojchinovski, Vladimir Trajkovik
2011 Information & Security An International Journal  
The main challenge for SOA security still drifts around 'clouds' and there is still a lack of suitable frameworks for security models based on consistent and convenient methods.  ...  The paper's main aim is to provide a contribution in developing suitable security solutions to Intelligence Information Systems using web service security standards in order to reach appropriate level  ...  Also, the Liberty Alli-ance published ID-WSF (Identity Web Services Framework) which is based on SAML 2.0. These two standards are most used in modelling federated identity.  ... 
doi:10.11610/isij.2710 fatcat:2o2n4a7jczekpntowlar4w24iu

Research on Strongly Unforgeable Ring Signature Scheme Based on ID

Gang Zeng
2014 IOSR Journal of Computer Engineering  
s ID-based ring signature scheme, then we construct a strongly unforgeable ID-based ring signature scheme in the standard model based on the standard discrete logarithm problem (DLP).  ...  A ring signature system is strongly unforgeable if the ring signature is existential unforgeable and, given ring signatures on some message m, the adversary can not produce a new ring signature on m.  ...  's ID-based ring signature scheme in standard model, we proposed astrongly unforgeable ring signature scheme in the standard model.  ... 
doi:10.9790/0661-16595559 fatcat:2slzsxkhlngw5lmhfmj6htjahe

Multiple statistical signatures of human confidence [article]

Manuel Rausch, Michael Zehetleitner
2018 bioRxiv   pre-print
Here, we show that the standard model is a special case in which evidence about stimulus strength is omitted in the objective calculation of confidence.  ...  AbstractThe so called standard model of confidence predicts a specific statistical signature of confidence that has been widely used to objectively identify neural, behavioural, and physiological correlates  ...  Fig 3 3 shows the statistical signatures of confidence obtained from simulations based on the standard model.  ... 
doi:10.1101/426635 fatcat:favommm7qrhzvmz7lyg4vpl47q
« Previous Showing results 1 — 15 out of 323,059 results