
Previous Article
Efficient list decoding of a class of algebraicgeometry codes
 AMC Home
 This Issue

Next Article
On cyclefree lattices with high rate label codes
On the generic construction of identitybased signatures with additional properties
1.  University of Luxembourg, L1359, Luxembourg 
2.  Dept. Matemàtica Aplicada IV, Universitat Politècnica de Catalunya, Barcelona, 08034, Spain 
3.  RuhrUniversity Bochum, Bochum, D44780, Germany 
Using wellknown results for standard signature schemes, we conclude that explicit identitybased signature schemes with additional properties can be constructed, enjoying sometimes better properties than specific schemes proposed until now. In particular, our work implies the existence of identitybased signatures with additional properties that are provably secure in the standard model, do not need bilinear pairings, or can be based on general assumptions.
References:
[1] 
, IEEE P1363.3:, Standard for identitybased cryptographic techniques using pairings., (). 
[2] 
M. Abdalla, C. Namprempre and G. Neven, On the (im)possibility of blind message authentication codes, in "Proceedings of CTRSA'06" (ed. D. Pointcheval), SpringerVerlag, (2006), 262279. 
[3] 
M. Abe and E. Fujisaki, How to date blind signatures, in "Proceedings of Asiacrypt'96" (eds. K. Kim and T. Matsumoto), SpringerVerlag, (1996), 244251. 
[4] 
M. Abe and T. Okamoto, Provably secure partially blind signatures, in "Proceedings of Crypto'00" (ed. M. Bellare), SpringerVerlag, (2000), 271286. 
[5] 
J. H. Ahn, M. Green and S. Hohenberger, Synchronized aggregate signatures: neew definitions, constructions and applications, in "Proceedings of CCS'10," to appear, ACM Press, (2010); available online at http://eprint.iacr.org/2010/422. 
[6] 
S. S. AlRiyami and K. G. Paterson, Certificateless public key cryptography, in "Proceedings of Asiacrypt'03" (ed. C.S. Laih), SpringerVerlag, (2003), 452473. 
[7] 
G. Ateniese and B. De Medeiros, Identitybased chameleon hash and applications, in "Proceedings of Financial Cryptography'04" (ed. A. Juels), SpringerVerlag, (2004), 164180. 
[8] 
J. Baek and Y. Zheng, Identitybased threshold signature scheme from the bilinear pairings, in "Proceedings of ITCC'04 (1)," IEEE Computer Society, (2004), 124128. 
[9] 
M. Bellare and S. K. Miner, A forwardsecure digital signature scheme, in "Proceedings of Crypto'99" (ed. M.J. Wiener), SpringerVerlag, (1999), 431448. 
[10] 
M. Bellare, C. Namprempre and G. Neven, Security proofs for identitybased identification and signature schemes, Journal of Cryptology, 22 (2009), 161. doi: 10.1007/s0014500890288. 
[11] 
M. Bellare, C. Namprempre, D. Pointcheval and M. Semanko, The onemorersainversion problems and the security of chaum's blind signature scheme, Journal of Cryptology, 16 (2003), 185215. doi: 10.1007/s0014500201201. 
[12] 
M. Bellare and P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in "Proceedings of CCS'93," ACM Press, (1993), 6273. 
[13] 
A. Boldyreva, Threshold signatures, multisignatures and blind signatures based on the gapdiffiehellmangroup signature scheme, in "Proceedings of PKC'03" (ed. Y. Desmedt), SpringerVerlag, (2002), 3146. 
[14] 
A. Boldyreva, C. Gentry, A. O'Neill and D. H. Yum, Ordered multisignatures and identitybased sequential aggregate signatures, with applications to secure routing, in "Proceedings of CCS'07" (eds. F. Bao and S. Miller), ACM Press, (2007), 276285. 
[15] 
A. Boldyreva, A. Palacio, and B. Warinschi, Secure proxy signature schemes for delegation of signing rights,, Technical report, (). 
[16] 
D. Boneh and X. Boyen, Short signatures without random oracles and the SDH assumption in bilinear groups, Journal of Cryptology, 21 (2008), 149177. doi: 10.1007/s0014500790057. 
[17] 
D. Boneh and M. K. Franklin, Identity based encryption from the Weil pairing, SIAM Journal on Computing, 32 (2003), 586615. doi: 10.1137/S0097539701398521. 
[18] 
D. Boneh, C. Gentry, B. Lynn and H. Shacham, Aggregate and verifiably encrypted signatures from bilinear maps, in "Proceedings of Eurocrypt'03" (ed. E. Biham), SpringerVerlag, (2003), 416432. 
[19] 
D. Boneh, B. Lynn and H. Shacham, Short signatures from the Weil pairing, Journal of Cryptology, 17 (2004), 297319. doi: 10.1007/s0014500403149. 
[20] 
J. Camenisch, M. Koprowski and B. Warinschi, Efficient blind signatures without random oracles, in "Proceedings of SCN'04" (eds. C. Blundo and S. Cimato), SpringerVerlag, (2004), 134148. 
[21] 
R. Canneti, O. Goldreich and S. Halevi, The random oracle methodology, revisited, Journal of the ACM, 51 (2004), 557594. doi: 10.1145/1008731.1008734. 
[22] 
D. Chaum, Blind signatures for untraceable payments, in "Proceedings of Crypto'82" (eds. D. Chaum, R.L. Rivest and A.T. Sherman), Plenum Press, (1983), 199203. 
[23] 
D. Chaum, Designated confirmer signatures, in "Proceedings of Eurocrypt'94" (ed. A. De Santis), SpringerVerlag, (1995), 8691. 
[24] 
D. Chaum and H. Van Antwerpen, Undeniable signatures, in "Proceedings of Crypto'89" (ed. G. Brassard), SpringerVerlag, (1989), 212216. 
[25] 
X. Cheng, J. Liu and X. Wang, An identitybased signature and its threshold version, in "Proceedings of AINA'05," IEEE Computer Society, (2005), 973977. 
[26] 
X. Cheng, J. Liu and X. Wang, Identitybased aggregate and verifiably encrypted signatures from bilinear pairing, in "Proceedings of ICCSA'05 (IV)" (eds. O. Gervasi et al.), SpringerVerlag, (2005), 10461054. 
[27] 
S. S. M. Chow, L. C. K. Hui, S. M Yiu and K. P. Chow, Two improved partially blind signature schemes from bilinear pairings, in "Proceedings of ACISP'05" (eds. C. Boyd and J.M. González Nieto), SpringerVerlag, (2005), 316328. 
[28] 
I. Damgard, N. Fazio and A. Nicolosi, Noninteractive zeroknowledge from homomorphic encryption, in "Proceedings of TCC'06" (eds. S. Halevi and T. Rabin), SpringerVerlag, (2006), 4159. 
[29] 
I. Damgard and T. P. Pedersen, New convertible undeniable signature schemes, in "Proceedings of Eurocrypt'96" (ed. U.M. Maurer), SpringerVerlag, (1996), 372386. 
[30] 
Y. Dodis and J. Katz, Chosenciphertext security of multiple encryption, in "Proceedings of TCC'05" (ed. J. Kilian), SpringerVerlag, (2005), 188209. 
[31] 
Y. Dodis, J. Katz, S. Xu and M. Yung, Keyinsulated public key cryptosystems, in "Proceedings of Eurocrypt'02" (ed. L.R. Knudsen), SpringerVerlag, (2002), 6582. 
[32] 
S. Even, O. Goldreich and S. Micali, Online/offline digital signatures, Journal of Cryptology, 9 (1996), 3567. doi: 10.1007/BF02254791. 
[33] 
M. Fischlin, Roundoptimal composable blind signatures in the common reference string model, in "Proceedings of Crypto'06" (ed. D. Dwork), SpringerVerlag, (2006), 6077. 
[34] 
S. Galbraith and W. Mao, Invisibility and anonymity of undeniable and confirmer signatures, in "Proceedings of CTRSA'03," (ed. M. Joye), SpringerVerlag, (2003), 8097. 
[35] 
C. Gentry and Z. Ramzan, Identitybased aggregate signatures, in "Proceedings of PKC'06" (eds. M. Yung, Y. Dodis, A. Kiayias and T. Malkin), SpringerVerlag, (2006), 257273. 
[36] 
C. Gentry and A. Silverberg, Hierarchical idbased cryptography, in "Proceedings of Asiacrypt'02" (ed. Y. Zheng), SpringerVerlag, (2002), 548566. 
[37] 
S. Goldwasser, S. Micali and R. L. Rivest, A digital signature scheme secure against adaptive chosenmessage attacks, SIAM Journal on Computing, 17 (1988), 281308. doi: 10.1137/0217017. 
[38] 
S. Goldwasser and R. Ostrovsky, Invariant signatures and noninteractive zeroknowledge proofs are equivalent, in "Proceedings of Crypto'92" (ed. E.F. Brickell), SpringerVerlag, (1992), 228245. 
[39] 
C. Gu and Y. Zhu, An idbased verifiable encrypted signature scheme based on Hess's scheme, in "Proceedings of CISC'05" (eds. D. Feng, D. Lin and M. Yung), SpringerVerlag, (2005), 4252. 
[40] 
J. Herranz, Deterministic identitybased signatures for partial aggregation, The Computer Journal, 49 (2006), 322330. doi: 10.1093/comjnl/bxh153. 
[41] 
B. C. Hu, D. S. Wong, Z. Zhang and X. Deng, Certificateless signature: a new security model and an improved generic construction, Designs, Codes and Cryptography, 42 (2007), 109126. doi: 10.1007/s1062300690229. 
[42] 
M. Jakobsson, K. Sako and R. Impagliazzo, Designated verifier proofs and their applications, in "Proceedings of Eurocrypt'96" (ed. U.M. Maurer), SpringerVerlag, (1996), 143154. 
[43] 
R. Johnson, D. Molnar, D. X. Song and D. Wagner, Homomorphic signature schemes, in "Proceedings of CTRSA'02" (ed. B. Preneel), SpringerVerlag, (2002), 244262. 
[44] 
A. Juels, M. Luby and R. Ostrovsky, Security of blind digital signatures, in "Proceedings of Crypto'97" (ed. B.S. Kaliski, Jr.), SpringerVerlag, (1997), 150164. 
[45] 
E. Kiltz, A. Mityagin, S. Panjwani and B. Raghava, Appendonly signatures, in "Proceedings of ICALP'05" (eds. L. Caires et al.), SpringerVerlag, (2005), 434445. 
[46] 
H. Krawczyk, Simple forwardsecure signatures from any signature scheme, in "Proceedings of CCS'00," ACM Press, (2000), 108115. 
[47] 
H. Krawczyk and T. Rabin, Chameleon signatures, in "Proceedings of NDSS'00," The Internet Society, (2000). 
[48] 
F. Laguillaumie and D. Vergnaud, Short undeniable signatures without random oracles: the missing link, in "Proceedings of Indocrypt'05" (eds. S. Maitra, C.E.V. Madhavan and R. Venkatesan), SpringerVerlag, (2005), 283296. 
[49] 
L. Lamport, Constructing digital signatures from a oneway function, Technical report, SRI International, (1979). 
[50] 
B. Libert and JJ. Quisquater, Identity based undeniable signatures, in "Proceedings of CTRSA'04" (ed. T. Okamoto), SpringerVerlag, (2004), 112125. 
[51] 
Y. Liu, X. Yin and L. Qiu, Idbased forwardsecure signature scheme from the bilinear pairings, in "Proceedings of International Symposium on Electronic Commerce and Security," IEEE Computer Society, (2008), 179183. doi: 10.1109/ISECS.2008.220. 
[52] 
S. Lu, R. Ostrovsky, A. Sahai, H. Shacham and B. Waters, Sequential aggregate signatures and multisignatures without random oracles, in "Proceedings of Eurocrypt'06" (ed. S. Vaudenay), SpringerVerlag, (2006), 465485. 
[53] 
A. Lysyanskaya, Unique signatures and verifiable random functions from the dhddh separation, in "Proceedings of Crypto'02" (ed. M. Yung), SpringerVerlag, (2002), 597612. 
[54] 
A. Lysyanskaya, S. Micali, L. Reyzin and H. Shacham, Sequential aggregate signatures from trapdoor permutations, in "Proceedings of Eurocrypt'04" (eds. C. Cachin and J. Camenisch), SpringerVerlag, (2004), 7490. 
[55] 
M. Mambo, K. Usuda and E. Okamoto, Proxy signatures: delegation of the power to sign messages, IEICE Trans. Fundamentals, E79A (1996), 13381353. 
[56] 
G. Neven, Efficient sequential aggregate signed data, in "Proceedings of Eurocrypt'08" (ed. N.P. Smart), SpringerVerlag, (2008), 5269. 
[57] 
T. Okamoto, Efficient blind and partially blind signatures without random oracles, in "Proceedings of TCC'06" (eds. S. Halevi and T. Rabin), SpringerVerlag, (2006), 8099. 
[58] 
L. T. Phong and W. Ogata, New identitybased blind signature and blind decryption scheme in the standard model, IEICE Trans. Fundamentals, E92A (2009), 18221835. 
[59] 
D. Pointcheval and J. Stern, Security arguments for digital signatures and blind signatures, Journal of Cryptology, 13 (2000), 361396. doi: 10.1007/s001450010003. 
[60] 
R. Rivest, A. Shamir and Y. Tauman, How to leak a secret, in "Proceedings of Asiacrypt'01" (ed. C. Boyd), SpringerVerlag, (2001), 552565. 
[61] 
R. Sakai, K. Ohgishi and M. Kasahara, Cryptosystems based on pairings, in "Proceedings of Symposium on Cryptography and Information Security, SCIS 2000 (Japan)," (2000). 
[62] 
A. Shamir, Identitybased cryptosystems and signature schemes, in "Proceedings of Crypto'84" (eds. G.R. Blakley and D. Chaum), SpringerVerlag, (1985), 4753. 
[63] 
A. Shamir and Y. Tauman, Improved online/offline signature schemes, in "Proceedings of Crypto'01" (ed. J. Kilian), SpringerVerlag, (2001), 355367. 
[64] 
W. Susilo, F. Zhang and Y. Mu, Identitybased strong designated verifier signature schemes, in "Proceedings of ACISP'04" (eds. H. Wang, J. Pieprzyk and V. Varadharajan), SpringerVerlag, (2004), 313324. 
[65] 
W. Susilo, F. Zhang and Y. Mu, On the security of nominative signatures, in "Proceedings of ACISP'05" (eds. C. Boyd and J.M. González Nieto), SpringerVerlag, (2005), 329335. 
[66] 
G. Wang, W. Gao, X. Wang and F. Li, Oneround idbased blind signature scheme without ROS assumption, in "Proceedings of Pairing'08" (eds. S.D. Galbraith and K.G. Paterson), SpringerVerlag, (2008), 316331. 
[67] 
J. Weng, S. Liu, K. Chen and X. Li, Identitybased keyinsulated signature with secure keyupdates, in "Proceedings of Inscrypt'06" (eds. H. Lipmaa, M. Yung and D. Lin), SpringerVerlag, (2006), 1326. 
[68] 
J. Xu, Z. Zhang and D. Feng, IDbased proxy signature using bilinear pairings, in "Proceedings of ISPA'05" (eds. G. Chen, Y. Pan, M. Guo and J. Lu), SpringerVerlag, (2005), 359367. 
[69] 
S. Xu, Y. Mu and W. Susilo, Efficient authentication scheme for routing in mobile ad hoc networks, in "Proceedings of EUC Workshops'05" (eds. T. Enokido et al.), SpringerVerlag, (2005), 854863. 
[70] 
F. Zhang and K. Kim, Idbased blind signature and ring signature from pairings, in "Proceedings of Asiacrypt'02" (ed. Y. Zheng), SpringerVerlag, (2002), 533547. 
[71] 
F. Zhang and K. Kim, Efficient IDbased blind signature and proxy signature from bilinear pairings, in "Proceedings of ACISP'03" (eds. R. SafaviNaini and J. Seberry), SpringerVerlag, (2003), 312323. 
[72] 
Y. Zhou, Z. Cao and Z. Chai, Identity based key insulated signature, in "Proceedings of ISPEC'06" (eds. K. Chen, R.H. Deng, X. Lai and J. Zhou), SpringerVerlag, (2006), 226234. 
show all references
References:
[1] 
, IEEE P1363.3:, Standard for identitybased cryptographic techniques using pairings., (). 
[2] 
M. Abdalla, C. Namprempre and G. Neven, On the (im)possibility of blind message authentication codes, in "Proceedings of CTRSA'06" (ed. D. Pointcheval), SpringerVerlag, (2006), 262279. 
[3] 
M. Abe and E. Fujisaki, How to date blind signatures, in "Proceedings of Asiacrypt'96" (eds. K. Kim and T. Matsumoto), SpringerVerlag, (1996), 244251. 
[4] 
M. Abe and T. Okamoto, Provably secure partially blind signatures, in "Proceedings of Crypto'00" (ed. M. Bellare), SpringerVerlag, (2000), 271286. 
[5] 
J. H. Ahn, M. Green and S. Hohenberger, Synchronized aggregate signatures: neew definitions, constructions and applications, in "Proceedings of CCS'10," to appear, ACM Press, (2010); available online at http://eprint.iacr.org/2010/422. 
[6] 
S. S. AlRiyami and K. G. Paterson, Certificateless public key cryptography, in "Proceedings of Asiacrypt'03" (ed. C.S. Laih), SpringerVerlag, (2003), 452473. 
[7] 
G. Ateniese and B. De Medeiros, Identitybased chameleon hash and applications, in "Proceedings of Financial Cryptography'04" (ed. A. Juels), SpringerVerlag, (2004), 164180. 
[8] 
J. Baek and Y. Zheng, Identitybased threshold signature scheme from the bilinear pairings, in "Proceedings of ITCC'04 (1)," IEEE Computer Society, (2004), 124128. 
[9] 
M. Bellare and S. K. Miner, A forwardsecure digital signature scheme, in "Proceedings of Crypto'99" (ed. M.J. Wiener), SpringerVerlag, (1999), 431448. 
[10] 
M. Bellare, C. Namprempre and G. Neven, Security proofs for identitybased identification and signature schemes, Journal of Cryptology, 22 (2009), 161. doi: 10.1007/s0014500890288. 
[11] 
M. Bellare, C. Namprempre, D. Pointcheval and M. Semanko, The onemorersainversion problems and the security of chaum's blind signature scheme, Journal of Cryptology, 16 (2003), 185215. doi: 10.1007/s0014500201201. 
[12] 
M. Bellare and P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in "Proceedings of CCS'93," ACM Press, (1993), 6273. 
[13] 
A. Boldyreva, Threshold signatures, multisignatures and blind signatures based on the gapdiffiehellmangroup signature scheme, in "Proceedings of PKC'03" (ed. Y. Desmedt), SpringerVerlag, (2002), 3146. 
[14] 
A. Boldyreva, C. Gentry, A. O'Neill and D. H. Yum, Ordered multisignatures and identitybased sequential aggregate signatures, with applications to secure routing, in "Proceedings of CCS'07" (eds. F. Bao and S. Miller), ACM Press, (2007), 276285. 
[15] 
A. Boldyreva, A. Palacio, and B. Warinschi, Secure proxy signature schemes for delegation of signing rights,, Technical report, (). 
[16] 
D. Boneh and X. Boyen, Short signatures without random oracles and the SDH assumption in bilinear groups, Journal of Cryptology, 21 (2008), 149177. doi: 10.1007/s0014500790057. 
[17] 
D. Boneh and M. K. Franklin, Identity based encryption from the Weil pairing, SIAM Journal on Computing, 32 (2003), 586615. doi: 10.1137/S0097539701398521. 
[18] 
D. Boneh, C. Gentry, B. Lynn and H. Shacham, Aggregate and verifiably encrypted signatures from bilinear maps, in "Proceedings of Eurocrypt'03" (ed. E. Biham), SpringerVerlag, (2003), 416432. 
[19] 
D. Boneh, B. Lynn and H. Shacham, Short signatures from the Weil pairing, Journal of Cryptology, 17 (2004), 297319. doi: 10.1007/s0014500403149. 
[20] 
J. Camenisch, M. Koprowski and B. Warinschi, Efficient blind signatures without random oracles, in "Proceedings of SCN'04" (eds. C. Blundo and S. Cimato), SpringerVerlag, (2004), 134148. 
[21] 
R. Canneti, O. Goldreich and S. Halevi, The random oracle methodology, revisited, Journal of the ACM, 51 (2004), 557594. doi: 10.1145/1008731.1008734. 
[22] 
D. Chaum, Blind signatures for untraceable payments, in "Proceedings of Crypto'82" (eds. D. Chaum, R.L. Rivest and A.T. Sherman), Plenum Press, (1983), 199203. 
[23] 
D. Chaum, Designated confirmer signatures, in "Proceedings of Eurocrypt'94" (ed. A. De Santis), SpringerVerlag, (1995), 8691. 
[24] 
D. Chaum and H. Van Antwerpen, Undeniable signatures, in "Proceedings of Crypto'89" (ed. G. Brassard), SpringerVerlag, (1989), 212216. 
[25] 
X. Cheng, J. Liu and X. Wang, An identitybased signature and its threshold version, in "Proceedings of AINA'05," IEEE Computer Society, (2005), 973977. 
[26] 
X. Cheng, J. Liu and X. Wang, Identitybased aggregate and verifiably encrypted signatures from bilinear pairing, in "Proceedings of ICCSA'05 (IV)" (eds. O. Gervasi et al.), SpringerVerlag, (2005), 10461054. 
[27] 
S. S. M. Chow, L. C. K. Hui, S. M Yiu and K. P. Chow, Two improved partially blind signature schemes from bilinear pairings, in "Proceedings of ACISP'05" (eds. C. Boyd and J.M. González Nieto), SpringerVerlag, (2005), 316328. 
[28] 
I. Damgard, N. Fazio and A. Nicolosi, Noninteractive zeroknowledge from homomorphic encryption, in "Proceedings of TCC'06" (eds. S. Halevi and T. Rabin), SpringerVerlag, (2006), 4159. 
[29] 
I. Damgard and T. P. Pedersen, New convertible undeniable signature schemes, in "Proceedings of Eurocrypt'96" (ed. U.M. Maurer), SpringerVerlag, (1996), 372386. 
[30] 
Y. Dodis and J. Katz, Chosenciphertext security of multiple encryption, in "Proceedings of TCC'05" (ed. J. Kilian), SpringerVerlag, (2005), 188209. 
[31] 
Y. Dodis, J. Katz, S. Xu and M. Yung, Keyinsulated public key cryptosystems, in "Proceedings of Eurocrypt'02" (ed. L.R. Knudsen), SpringerVerlag, (2002), 6582. 
[32] 
S. Even, O. Goldreich and S. Micali, Online/offline digital signatures, Journal of Cryptology, 9 (1996), 3567. doi: 10.1007/BF02254791. 
[33] 
M. Fischlin, Roundoptimal composable blind signatures in the common reference string model, in "Proceedings of Crypto'06" (ed. D. Dwork), SpringerVerlag, (2006), 6077. 
[34] 
S. Galbraith and W. Mao, Invisibility and anonymity of undeniable and confirmer signatures, in "Proceedings of CTRSA'03," (ed. M. Joye), SpringerVerlag, (2003), 8097. 
[35] 
C. Gentry and Z. Ramzan, Identitybased aggregate signatures, in "Proceedings of PKC'06" (eds. M. Yung, Y. Dodis, A. Kiayias and T. Malkin), SpringerVerlag, (2006), 257273. 
[36] 
C. Gentry and A. Silverberg, Hierarchical idbased cryptography, in "Proceedings of Asiacrypt'02" (ed. Y. Zheng), SpringerVerlag, (2002), 548566. 
[37] 
S. Goldwasser, S. Micali and R. L. Rivest, A digital signature scheme secure against adaptive chosenmessage attacks, SIAM Journal on Computing, 17 (1988), 281308. doi: 10.1137/0217017. 
[38] 
S. Goldwasser and R. Ostrovsky, Invariant signatures and noninteractive zeroknowledge proofs are equivalent, in "Proceedings of Crypto'92" (ed. E.F. Brickell), SpringerVerlag, (1992), 228245. 
[39] 
C. Gu and Y. Zhu, An idbased verifiable encrypted signature scheme based on Hess's scheme, in "Proceedings of CISC'05" (eds. D. Feng, D. Lin and M. Yung), SpringerVerlag, (2005), 4252. 
[40] 
J. Herranz, Deterministic identitybased signatures for partial aggregation, The Computer Journal, 49 (2006), 322330. doi: 10.1093/comjnl/bxh153. 
[41] 
B. C. Hu, D. S. Wong, Z. Zhang and X. Deng, Certificateless signature: a new security model and an improved generic construction, Designs, Codes and Cryptography, 42 (2007), 109126. doi: 10.1007/s1062300690229. 
[42] 
M. Jakobsson, K. Sako and R. Impagliazzo, Designated verifier proofs and their applications, in "Proceedings of Eurocrypt'96" (ed. U.M. Maurer), SpringerVerlag, (1996), 143154. 
[43] 
R. Johnson, D. Molnar, D. X. Song and D. Wagner, Homomorphic signature schemes, in "Proceedings of CTRSA'02" (ed. B. Preneel), SpringerVerlag, (2002), 244262. 
[44] 
A. Juels, M. Luby and R. Ostrovsky, Security of blind digital signatures, in "Proceedings of Crypto'97" (ed. B.S. Kaliski, Jr.), SpringerVerlag, (1997), 150164. 
[45] 
E. Kiltz, A. Mityagin, S. Panjwani and B. Raghava, Appendonly signatures, in "Proceedings of ICALP'05" (eds. L. Caires et al.), SpringerVerlag, (2005), 434445. 
[46] 
H. Krawczyk, Simple forwardsecure signatures from any signature scheme, in "Proceedings of CCS'00," ACM Press, (2000), 108115. 
[47] 
H. Krawczyk and T. Rabin, Chameleon signatures, in "Proceedings of NDSS'00," The Internet Society, (2000). 
[48] 
F. Laguillaumie and D. Vergnaud, Short undeniable signatures without random oracles: the missing link, in "Proceedings of Indocrypt'05" (eds. S. Maitra, C.E.V. Madhavan and R. Venkatesan), SpringerVerlag, (2005), 283296. 
[49] 
L. Lamport, Constructing digital signatures from a oneway function, Technical report, SRI International, (1979). 
[50] 
B. Libert and JJ. Quisquater, Identity based undeniable signatures, in "Proceedings of CTRSA'04" (ed. T. Okamoto), SpringerVerlag, (2004), 112125. 
[51] 
Y. Liu, X. Yin and L. Qiu, Idbased forwardsecure signature scheme from the bilinear pairings, in "Proceedings of International Symposium on Electronic Commerce and Security," IEEE Computer Society, (2008), 179183. doi: 10.1109/ISECS.2008.220. 
[52] 
S. Lu, R. Ostrovsky, A. Sahai, H. Shacham and B. Waters, Sequential aggregate signatures and multisignatures without random oracles, in "Proceedings of Eurocrypt'06" (ed. S. Vaudenay), SpringerVerlag, (2006), 465485. 
[53] 
A. Lysyanskaya, Unique signatures and verifiable random functions from the dhddh separation, in "Proceedings of Crypto'02" (ed. M. Yung), SpringerVerlag, (2002), 597612. 
[54] 
A. Lysyanskaya, S. Micali, L. Reyzin and H. Shacham, Sequential aggregate signatures from trapdoor permutations, in "Proceedings of Eurocrypt'04" (eds. C. Cachin and J. Camenisch), SpringerVerlag, (2004), 7490. 
[55] 
M. Mambo, K. Usuda and E. Okamoto, Proxy signatures: delegation of the power to sign messages, IEICE Trans. Fundamentals, E79A (1996), 13381353. 
[56] 
G. Neven, Efficient sequential aggregate signed data, in "Proceedings of Eurocrypt'08" (ed. N.P. Smart), SpringerVerlag, (2008), 5269. 
[57] 
T. Okamoto, Efficient blind and partially blind signatures without random oracles, in "Proceedings of TCC'06" (eds. S. Halevi and T. Rabin), SpringerVerlag, (2006), 8099. 
[58] 
L. T. Phong and W. Ogata, New identitybased blind signature and blind decryption scheme in the standard model, IEICE Trans. Fundamentals, E92A (2009), 18221835. 
[59] 
D. Pointcheval and J. Stern, Security arguments for digital signatures and blind signatures, Journal of Cryptology, 13 (2000), 361396. doi: 10.1007/s001450010003. 
[60] 
R. Rivest, A. Shamir and Y. Tauman, How to leak a secret, in "Proceedings of Asiacrypt'01" (ed. C. Boyd), SpringerVerlag, (2001), 552565. 
[61] 
R. Sakai, K. Ohgishi and M. Kasahara, Cryptosystems based on pairings, in "Proceedings of Symposium on Cryptography and Information Security, SCIS 2000 (Japan)," (2000). 
[62] 
A. Shamir, Identitybased cryptosystems and signature schemes, in "Proceedings of Crypto'84" (eds. G.R. Blakley and D. Chaum), SpringerVerlag, (1985), 4753. 
[63] 
A. Shamir and Y. Tauman, Improved online/offline signature schemes, in "Proceedings of Crypto'01" (ed. J. Kilian), SpringerVerlag, (2001), 355367. 
[64] 
W. Susilo, F. Zhang and Y. Mu, Identitybased strong designated verifier signature schemes, in "Proceedings of ACISP'04" (eds. H. Wang, J. Pieprzyk and V. Varadharajan), SpringerVerlag, (2004), 313324. 
[65] 
W. Susilo, F. Zhang and Y. Mu, On the security of nominative signatures, in "Proceedings of ACISP'05" (eds. C. Boyd and J.M. González Nieto), SpringerVerlag, (2005), 329335. 
[66] 
G. Wang, W. Gao, X. Wang and F. Li, Oneround idbased blind signature scheme without ROS assumption, in "Proceedings of Pairing'08" (eds. S.D. Galbraith and K.G. Paterson), SpringerVerlag, (2008), 316331. 
[67] 
J. Weng, S. Liu, K. Chen and X. Li, Identitybased keyinsulated signature with secure keyupdates, in "Proceedings of Inscrypt'06" (eds. H. Lipmaa, M. Yung and D. Lin), SpringerVerlag, (2006), 1326. 
[68] 
J. Xu, Z. Zhang and D. Feng, IDbased proxy signature using bilinear pairings, in "Proceedings of ISPA'05" (eds. G. Chen, Y. Pan, M. Guo and J. Lu), SpringerVerlag, (2005), 359367. 
[69] 
S. Xu, Y. Mu and W. Susilo, Efficient authentication scheme for routing in mobile ad hoc networks, in "Proceedings of EUC Workshops'05" (eds. T. Enokido et al.), SpringerVerlag, (2005), 854863. 
[70] 
F. Zhang and K. Kim, Idbased blind signature and ring signature from pairings, in "Proceedings of Asiacrypt'02" (ed. Y. Zheng), SpringerVerlag, (2002), 533547. 
[71] 
F. Zhang and K. Kim, Efficient IDbased blind signature and proxy signature from bilinear pairings, in "Proceedings of ACISP'03" (eds. R. SafaviNaini and J. Seberry), SpringerVerlag, (2003), 312323. 
[72] 
Y. Zhou, Z. Cao and Z. Chai, Identity based key insulated signature, in "Proceedings of ISPEC'06" (eds. K. Chen, R.H. Deng, X. Lai and J. Zhou), SpringerVerlag, (2006), 226234. 
[1] 
Ramprasad Sarkar, Mriganka Mandal, Sourav Mukhopadhyay. Quantumsafe identitybased broadcast encryption with provable security from multivariate cryptography. Advances in Mathematics of Communications, 2022 doi: 10.3934/amc.2022026 
[2] 
Sikhar Patranabis, Debdeep Mukhopadhyay. Identitybased key aggregate cryptosystem from multilinear maps. Advances in Mathematics of Communications, 2019, 13 (4) : 759778. doi: 10.3934/amc.2019044 
[3] 
Vikas Srivastava, Sumit Kumar Debnath, Pantelimon Stǎnicǎ, Saibal Kumar Pal. A multivariate identitybased broadcast encryption with applications to the internet of things. Advances in Mathematics of Communications, 2021 doi: 10.3934/amc.2021050 
[4] 
Yang Lu, Jiguo Li. Forwardsecure identitybased encryption with direct chosenciphertext security in the standard model. Advances in Mathematics of Communications, 2017, 11 (1) : 161177. doi: 10.3934/amc.2017010 
[5] 
Florian Luca, Igor E. Shparlinski. On finite fields for pairing based cryptography. Advances in Mathematics of Communications, 2007, 1 (3) : 281286. doi: 10.3934/amc.2007.1.281 
[6] 
Gérard Maze, Chris Monico, Joachim Rosenthal. Public key cryptography based on semigroup actions. Advances in Mathematics of Communications, 2007, 1 (4) : 489507. doi: 10.3934/amc.2007.1.489 
[7] 
Javier de la Cruz, Ricardo VillanuevaPolanco. Public key cryptography based on twisted dihedral group algebras. Advances in Mathematics of Communications, 2022 doi: 10.3934/amc.2022031 
[8] 
Zoltán Faigl, Miklós Telek. Modeling the signaling overhead in Host Identity Protocolbased secure mobile architectures. Journal of Industrial and Management Optimization, 2015, 11 (3) : 887920. doi: 10.3934/jimo.2015.11.887 
[9] 
Gregory M. Zaverucha, Douglas R. Stinson. Short onetime signatures. Advances in Mathematics of Communications, 2011, 5 (3) : 473488. doi: 10.3934/amc.2011.5.473 
[10] 
Andrew Melchionna. The sandpile identity element on an ellipse. Discrete and Continuous Dynamical Systems, 2022 doi: 10.3934/dcds.2022029 
[11] 
Mekonnen Tadese, Samuel Drapeau. Dual representation of expectilebased expected shortfall and its properties. Probability, Uncertainty and Quantitative Risk, 2021, 6 (2) : 99116. doi: 10.3934/puqr.2021005 
[12] 
Dhanya Shajin, A. N. Dudin, Olga Dudina, A. Krishnamoorthy. A twopriority single server retrial queue with additional items. Journal of Industrial and Management Optimization, 2020, 16 (6) : 28912912. doi: 10.3934/jimo.2019085 
[13] 
Sanjit Chatterjee, Berkant Ustaoğlu. Malleability and ownership of proxy signatures: Towards a stronger definition and its limitations. Advances in Mathematics of Communications, 2020, 14 (2) : 177205. doi: 10.3934/amc.2020015 
[14] 
Vincent Astier, Thomas Unger. Signatures, sums of hermitian squares and positive cones on algebras with involution. Electronic Research Announcements, 2018, 25: 1626. doi: 10.3934/era.2018.25.003 
[15] 
Diego F. Aranha, Ricardo Dahab, Julio López, Leonardo B. Oliveira. Efficient implementation of elliptic curve cryptography in wireless sensors. Advances in Mathematics of Communications, 2010, 4 (2) : 169187. doi: 10.3934/amc.2010.4.169 
[16] 
Andreas Klein. How to say yes, no and maybe with visual cryptography. Advances in Mathematics of Communications, 2008, 2 (3) : 249259. doi: 10.3934/amc.2008.2.249 
[17] 
Gerhard Frey. Relations between arithmetic geometry and public key cryptography. Advances in Mathematics of Communications, 2010, 4 (2) : 281305. doi: 10.3934/amc.2010.4.281 
[18] 
Jintai Ding, Sihem Mesnager, LihChung Wang. Letters for postquantum cryptography standard evaluation. Advances in Mathematics of Communications, 2020, 14 (1) : ii. doi: 10.3934/amc.2020012 
[19] 
AnnaLena HorlemannTrautmann, Violetta Weger. Information set decoding in the Lee metric with applications to cryptography. Advances in Mathematics of Communications, 2021, 15 (4) : 677699. doi: 10.3934/amc.2020089 
[20] 
Simone Fiori. Errorbased control systems on Riemannian state manifolds: Properties of the principal pushforward map associated to parallel transport. Mathematical Control and Related Fields, 2021, 11 (1) : 143167. doi: 10.3934/mcrf.2020031 
2020 Impact Factor: 0.935
Tools
Metrics
Other articles
by authors
[Back to Top]