Soft Computing

, Volume 23, Issue 3, pp 747–753 | Cite as

An efficient online/offline ID-based short signature procedure using extended chaotic maps

  • Chandrashekhar MeshramEmail author
  • Chun-Ta Li
  • Sarita Gajbhiye Meshram


Chaos has been dealt with a decent approach to reduce computational complexity while fulfilling security necessities of a cryptographic techniques. In this article, we purpose an efficient online/offline ID-based short signature procedure based on extended chaotic maps and also demonstrated that it is protected under unforgeability of ID-based short signature under chosen message attack. Some of the intriguing arrangements of presented procedures is that it gives multi-time use of the offline stockpiling, which permits the signer to reuse the offline pre-administered information in polynomial time, rather than one-time use in all past online/offline signature procedures.


Extended chaotic maps Signature technique ID-based short signature procedure UF-IBSS-CMA 



The author would like to thank both anonymous reviewers for their helpful advice. This work was supported by Dr. D.S. Kothari Post-Doctoral fellowship awarded by University Grants Commission, New Delhi, India.

Compliance with ethical standards

Conflicts of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.


  1. Bellare M, Namprempre C, Neven G (2009) Security proofs for identity based identification and signature schemes. J Cryptol 22:1–61MathSciNetCrossRefzbMATHGoogle Scholar
  2. Boneh D, Boyen X (2008) Short signatures without random oracles the SDH assumption in bilinear groups. J Cryptol 2:149–177MathSciNetCrossRefzbMATHGoogle Scholar
  3. Cha J, Cheon J (2003) An identity-based signature from gap Diffie Hellman groups. In: Proceedings of PKC’2003. Lecture notes in computer science. Springer, Berlin, vol 2567, pp 18–30Google Scholar
  4. Chain K, Kuo WC (2013) A new digital signature scheme based on chaotic maps. Nonlinear Dyn 74:1003–1012MathSciNetCrossRefzbMATHGoogle Scholar
  5. Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761MathSciNetCrossRefzbMATHGoogle Scholar
  6. Chen G, Chen Y, Liao X (2007a) An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fractals 31(3):571–579MathSciNetCrossRefzbMATHGoogle Scholar
  7. Chen X, Zhang F, Susilo W, Mu Y (2007b) Efficient generic online/offline signatures without key exposure. In: Proceedings of ACNS ’07. Lecture notes in computer science. Springer, Berlin, vol 4521, pp 18–30Google Scholar
  8. Dachselt F, Schwarz W (2001) Chaos and cryptography. IEEE Trans Circuits Syst I Fundam Theory Appl 48(12):1498–1509MathSciNetCrossRefzbMATHGoogle Scholar
  9. Deng S, Li Y, Xiao D (2010) Analysis and improvement of a chaos-based Hash function construction. Commun Nonlinear Sci Numer Simul 15(5):1338–1347MathSciNetCrossRefzbMATHGoogle Scholar
  10. Even S, Goldreich O, Micali S (1989) On-line/off-line digital signatures. In: Proceedings of CRYPTO ’89. Lecture notes in computer science. Springer, New York, vol 2442, pp 263-277Google Scholar
  11. Galindo D, Garcia F (2009) A schnorr-like lightweight identity-based signature scheme. In: Progress in cryptology-AFRICACRYPT 2009. Lecture notes in computer science. Springer, Berlin, vol 5580, pp 135–148Google Scholar
  12. Gao Y, Zeng P, Raymond Choo KK, Song F (2016) An improved online/offline identity-based signature scheme for WSNs. Int J Netw Secur 18(6):1143–1151Google Scholar
  13. Guillou LC, Quisquater JJ (1989) A “Paradoxical” identity-based signature scheme resulting from zero-knowledge. In: Proceedings of CRYPTO 88. Lecture notes in computer science. Springer, Berlin, vol 403, pp 216–231Google Scholar
  14. Han S, Chang E (2009) Chaotic map based key agreement without clock synchronization. Choas Soliton Fractals 39(3):1283–1289MathSciNetCrossRefzbMATHGoogle Scholar
  15. Herranz J (2005) Deterministic identity-based signatures for partial aggregation. Comput J 49(3):322–330CrossRefGoogle Scholar
  16. Hess F (2003) Efficient identity based signature schemes based on pairings. In: Selected area in cryptography, SAC2002. Lecture notes in computer science. Springer, Berlin, vol 2595, pp 310–324Google Scholar
  17. Joye M (2008) An efficient on-line/off-line signature scheme without random oracles. In: Proceedings of CANS ’08. Lecture notes in computer science. Springer, Berlin, vol 5339, pp 98–107Google Scholar
  18. Jye S (2011) A speech encryption using fractional chaotic systems. Nonlinear Dyn 65:103–108MathSciNetCrossRefzbMATHGoogle Scholar
  19. Kang B, Boyd C, Dawson E (2009) A novel identity-based strong designated verifier signature scheme. J Syst Softw 82:270–273CrossRefGoogle Scholar
  20. Kar J (2014) Provably secure online/off-line identity-based signature scheme for wireless sensor network. Int J Netw Secur 16(1):29–39Google Scholar
  21. Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1(3):6–21MathSciNetCrossRefGoogle Scholar
  22. Kurosawa K, Schmidt-Samoa K (2006) New online/offline signature schemes without random oracles. In: Proceedings of PKC ’06. Lecture notes in computer science. Springer, Berlin, vol 3958, pp 330–346Google Scholar
  23. Lai YM, Cheng PJ, Lee CC, Ku CY (2016) A new ticket-based authentication mechanism for fast handover in mesh network. PLoS ONE 11(5):e0155064CrossRefGoogle Scholar
  24. Lee CC, Hsu CW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1–2):201–211MathSciNetCrossRefGoogle Scholar
  25. Lee CC, Chen CL, Wu CY, Huang SY (2012) An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn 69(1–2):79–87MathSciNetCrossRefzbMATHGoogle Scholar
  26. Lee CC, Hsu CW, Lai YM, Vasilakos AV (2013) An enhanced mobile-healthcare emergency system based on extended chaotic maps. J Med Syst 37(5):9973CrossRefGoogle Scholar
  27. Lee CC, Li CT, Hsu CW (2013) A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn 73(1–2):125–132MathSciNetCrossRefzbMATHGoogle Scholar
  28. Lee CC, Li CT, Chiu ST, Lai YM (2014) A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn 79(4):2485–2495MathSciNetCrossRefzbMATHGoogle Scholar
  29. Lee CC, Lou DC, Li CT, Hsu CW (2014) An extended chaotic-maps-based protocol with key agreement for multiserver environments. Nonlinear Dyn 76(1):853–866MathSciNetCrossRefzbMATHGoogle Scholar
  30. Li F, Shirase M, Takagi T (2008) On the security of online/offline signatures and multisignatures from acisp’06. In: Proceedings of CANS ’08. Lecture notes in computer science. Springer, Berlin, vol 5339, pp 108–119Google Scholar
  31. Li CT, Lee CC, Weng CY (2014) A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J Med Syst 38(9):77CrossRefGoogle Scholar
  32. Li CT, Lee CC, Weng CY, Chen SJ (2016) A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J Med Syst 40(11):233CrossRefGoogle Scholar
  33. Mason JC, Handscomb DC (2003) Chebyshev polynomials. Chapman and Hall/CRC, Boca RatonzbMATHGoogle Scholar
  34. Meshram C (2015) An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem. Inf Process Lett 115(2):351–358MathSciNetCrossRefzbMATHGoogle Scholar
  35. Meshram C (2015) An efficient ID-based beta cryptosystem. Int J Secur Appl 9(2):189–202MathSciNetGoogle Scholar
  36. Meshram C, Li X (2017) New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group. J Inf Optim Sci 10(1080/02522667):1411013Google Scholar
  37. Meshram C, Meshram S (2013) An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem. Inf Process Lett 113(10–11):375–380MathSciNetCrossRefzbMATHGoogle Scholar
  38. Meshram C, Meshram SA (2017) Constructing new An ID-based cryptosystem for IFP and GDLP based cryptosystem. J Discrete Math Sci Cryptogr 20(5):1121–1134MathSciNetCrossRefGoogle Scholar
  39. Meshram C, Obaidat MS (2015) An ID-based quadratic-exponentiation randomized cryptographic scheme. In: IEEE proceeding of international conference on computer, information and telecommunication systems, pp 1–5Google Scholar
  40. Meshram C, Powar PL (2016) An efficient identity-based QER cryptographic scheme. Complex Intell Syst 2(4):285–291CrossRefGoogle Scholar
  41. Meshram C, Meshram S, Zhang M (2012) An ID-based cryptographic mechanisms based on GDLP and IFP. Inf Process Lett 112(19):753–758MathSciNetCrossRefzbMATHGoogle Scholar
  42. Meshram C, Powar PL, Obaidat MS, Lee CC (2016a) An IBE technique using partial discrete logarithm. Proc Comput Sci 93:735–741CrossRefGoogle Scholar
  43. Meshram C, Powar PL, Obaidat MS (2016b) An UF-IBSS-CMA protected online/offline identity-based short signature technique using PDL. Proc Comput Sci 93:847–853CrossRefGoogle Scholar
  44. Meshram C, Lee CC, Li CT, Chen CL (2017a) A secure key authentication scheme for cryptosystems based on GDLP and IFP. Soft Comput 21(24):7285–7291CrossRefGoogle Scholar
  45. Meshram C, Tseng YM, Lee CC, Meshram SG (2017b) An IND-ID-CPA secure ID-based cryptographic protocol using GDLP and IFP. Informatica 28(3):471–484MathSciNetCrossRefzbMATHGoogle Scholar
  46. Meshram C, Obaidat MS, Meshram SG (2017c) Chebyshev chaotic maps based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography. Secur Priv.
  47. Selvi SD, Sree V, Rangan CP (2011) Identity-based deterministic signature scheme without forking-lemma. Adv Inf Comput Secur 7038:79–95 Lecture Notes in Computer SciencezbMATHGoogle Scholar
  48. Shamir A, Tauman Y (2001) Improved online/offline signature schemes. In: Proceedings of CRYPTO ’01. Lecture notes in computer science. Springer, Berlin, vol 2139, pp 355–367Google Scholar
  49. Wang Y, Wong K, Liao X, Xiang T (2009) A block cipher with dynamic S-boxes based on tent map. Commun Nonlinear Sci Numer Simul 14(7):3089–3099MathSciNetCrossRefzbMATHGoogle Scholar
  50. Wang X, Yang L, Liu R (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62:615–621CrossRefzbMATHGoogle Scholar
  51. Wang X, Wang X, Zhao J (2011) Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn 63:587–597MathSciNetCrossRefGoogle Scholar
  52. Wong KW (2002) A fast chaotic cryptography scheme with dynamic look up table. Phys Lett A 298(4):238–242MathSciNetCrossRefzbMATHGoogle Scholar
  53. Xiao D, Shih F, Liao X (2010) A chaos-based hash function with both modification detection and localization capabilities. Commun Nonlinear Sci Numer Simul 15(9):2254–2261MathSciNetCrossRefzbMATHGoogle Scholar
  54. Xu S, Mu Y, Susilo W (2006) Online/offline signatures and multisignatures for AVOD and DSR routing security. In: Proceedings of ACISP ’06. Lecture notes in computer science. Springer, Berlin, vol 4058, pp 99–110Google Scholar
  55. Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fract 37(3):669–674MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  • Chandrashekhar Meshram
    • 1
    • 2
    Email author
  • Chun-Ta Li
    • 3
  • Sarita Gajbhiye Meshram
    • 1
    • 4
  1. 1.Department of Mathematics and Computer ScienceRani Durgavati UniversityJabalpurIndia
  2. 2.Department of MathematicsRTM Nagpur UniversityNagpurIndia
  3. 3.Department of Information ManagementTainan University of TechnologyTainanTaiwan, ROC
  4. 4.Department of Water Resources Development and ManagementIndian Institute of TechnologyRoorkeeIndia

Personalised recommendations