Skip to main content

Hierarchical Identity-Based Signature over Verifiable Random Function

  • Conference paper
  • First Online:
Frontiers in Cyber Security (FCS 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1105))

Included in the following conference series:

  • 532 Accesses

Abstract

Hierarchical computation makes an important role in constructing identity-based signature (IBS) since it provides a delegation mechanism to IBS, which results in the Hierarchical identity-based signature (HIBS). HIBS has widely potential applications in the large networks. However, the constructions available cannot propose a good trade-off for the private keys and signatures since the size of private keys or signatures depends on the identity depth. In this paper, a new hierarchical computation algorithm is introduced to construct HIBS scheme. The new scheme achieves O(1)-size private keys and signatures, which are independent of identity depth. It is the best trade-off at present. Furthermore, under the \(n+1-weak\) Computational Diffie-Hellman Exponent (\(n+1-wCDH\)) assumption, the scheme is provably secure against existential forgery in the standard model.

This work was supported in part by the National Cryptography Development Fund under Grant (MMJJ20180209), International S&T Cooperation Program of Shaanxi Province No. 2019KW-056.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advance in Cryptography, pp. 47–53. ACM, Santa Barbara (1984)

    Google Scholar 

  2. Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586–615 (2001)

    Article  MathSciNet  Google Scholar 

  3. Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223–238. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_14

    Chapter  Google Scholar 

  4. Gentry, C.: Practical identity-based encryption without random oracles. In: 24th Annual International Conference on The Theory and Applications of Cryptographic Techniques, pp. 445–464. ACM, Saint Petersburg (2006)

    Google Scholar 

  5. Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36178-2_34

    Chapter  Google Scholar 

  6. Waters, B.: Dual key encryption: realizing fully secure IBE and HIBE under simple assumption. In: 29th Annual International Cryptology Conference on Advances in Cryptology, pp. 619–636. ACM, Santa Barbara (2009)

    Google Scholar 

  7. Zhang, L., Hu, Y., Wu, Q.: Hierarchical Identity-Based Encryption with Constant size private keys. ETRI J. 34(1), 142–145 (2012)

    Article  Google Scholar 

  8. Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_26

    Chapter  Google Scholar 

  9. Cash, D., Hofheinz, D., Kiltz, E.: Bonsai trees, or how to delegate a lattice basis. In: 29th Annual International Conference on Theory and Applications of Cryptographic Techniques, pp. 523–552. ACM, French Riviera (2010)

    Google Scholar 

  10. Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553–572. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_28

    Chapter  MATH  Google Scholar 

  11. Chow, S.S.M., Hui, L.C.K., Yiu, S.M., Chow, K.P.: Secure hierarchical identity based signature and its application. In: Lopez, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 480–494. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30191-2_37

    Chapter  MATH  Google Scholar 

  12. Li, J., Zhang, F., Wang, Y.: A new hierarchical ID-based cryptosystem and CCA-secure PKE. In: Zhou, X., et al. (eds.) EUC 2006. LNCS, vol. 4097, pp. 362–371. Springer, Heidelberg (2006). https://doi.org/10.1007/11807964_37

    Chapter  Google Scholar 

  13. Au, M., Liu, J., Yuen, T., et al.: Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles. Cryptology ePrint Archive, Report 2006/308 (2006)

    Google Scholar 

  14. Yuen, T., Susilo, W., Mu, Y.: How to construct identity-based signatures without the key escrow problem. Int. J. Inf. Secur. 9(4), 297–311 (2010)

    Article  Google Scholar 

  15. Au, M., Liu, J., Yuen, T., et al.: Efficient Hierarchical Identity Based Signature in the Standard Model. Cryptology ePrint Archive, Report 2007/68 (2007)

    Google Scholar 

  16. Zhang, L., Hu, Y., Wu, Q.: New construction of short hierarchical ID-based signature in the standard model. Fundamenta Informaticae 90(1–2), 191–201 (2009)

    MathSciNet  MATH  Google Scholar 

  17. Zhang, L., Hu, Y., Wu, Q.: Adaptively secure hierarchical identity-based signature in the standard model. J. China Univ. Posts Telecommun. 17(6), 95–100 (2010)

    Article  Google Scholar 

  18. Abdalla, M., Catalano, D., Fiore, D.: Verifiable random functions from identity-based key encapsulation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 554–571. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01001-9_32

    Chapter  Google Scholar 

  19. Wu, Q., Zhang, L.: New efficient hierarchical identity-based signature. J. Comput. 8(3), 803–810 (2013)

    Article  Google Scholar 

  20. Rückert, M.: Strongly unforgeable signatures and hierarchical identity-based signatures from lattices without random oracles. In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 182–200. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-12929-2_14

    Chapter  Google Scholar 

  21. Tian, M., Huang, L., Yang, W.: A new hierarchical identity-based signature scheme from lattices in the standard model. Int. J. Netw. Secur. 14(6), 310–315 (2012)

    Google Scholar 

  22. Zhang, X., Xu, C., Jin, C., Xie, R.: Efficient forward secure identity-based shorter signature from lattice. Comput. Electr. Eng. 40(6), 1963–1971 (2014)

    Article  Google Scholar 

  23. Wang, X., Chen, P., Zhou, H., Su, J.: T-HIBE: a trustworthy and secure hierarchical identity-based encryption system. Chin. J. Electron (2015)

    Google Scholar 

  24. Li, J., Guo, Y., Yu, Q., Lu, Y., Zhang, Y.: Provably secure identity-based encryption resilient to post-challenge continuous auxiliary inputs leakage. Secur. Commun. Netw. 9(10), 1016–1024 (2016)

    Article  Google Scholar 

  25. Li, J., Teng, M., Zhang, Y., Yu, Q.: A leakage-resilient CCA-secure identity-based encryption scheme. Comput. J. 59(7), 1066–1075 (2017)

    Article  MathSciNet  Google Scholar 

  26. Li, J., Yu, Q., Zhang, Y.: Identity-based broadcast encryption with continuous leakage resilience. Inf. Sci. 429(3), 177–193 (2018)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juan Ren .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ren, J., Zhang, L. (2019). Hierarchical Identity-Based Signature over Verifiable Random Function. In: Shen, B., Wang, B., Han, J., Yu, Y. (eds) Frontiers in Cyber Security. FCS 2019. Communications in Computer and Information Science, vol 1105. Springer, Singapore. https://doi.org/10.1007/978-981-15-0818-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0818-9_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0817-2

  • Online ISBN: 978-981-15-0818-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics