2006
DOI: 10.1007/11780656_18
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Identity-Based Signatures Secure in the Standard Model

Abstract: Abstract. The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based signatures. This folklore construction method leads to schemes that are somewhat inefficient and leaves open the problem of finding more efficient direct constructions. We present the first such construction. Our scheme is obtained from a modification of Waters' recently proposed identity-based encryption scheme. It is comput… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
192
0
2

Year Published

2009
2009
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 182 publications
(194 citation statements)
references
References 28 publications
(31 reference statements)
0
192
0
2
Order By: Relevance
“…The attempts in ( [23,24]) show that a simple combination of Waters' ID-based encryption [30] and Paterson-Schuldt's ID-based signature [31] may not produce a secure ID-based signcryption. Therefore, the main contribution of this paper is to fill this gap by proposing an ID-based signcryption scheme whose security proof does not need to resort to the random oracle model.…”
Section: Our Contributionmentioning
confidence: 99%
“…The attempts in ( [23,24]) show that a simple combination of Waters' ID-based encryption [30] and Paterson-Schuldt's ID-based signature [31] may not produce a secure ID-based signcryption. Therefore, the main contribution of this paper is to fill this gap by proposing an ID-based signcryption scheme whose security proof does not need to resort to the random oracle model.…”
Section: Our Contributionmentioning
confidence: 99%
“…in [24] it is highlighted that the standard ISO/IEC 14888-2 [26] can be applied to derive identity-based multisignatures. Concerning implementations, there is an implementation of the [41] scheme in the JPBC library 13 and implementations of several schemes in Cayrel's website 14 .…”
Section: Identity-based Signaturesmentioning
confidence: 99%
“…An IBS scheme with provable security in the standard model was given by Paterson and Schuldt in [54].…”
Section: Identity-based Signaturementioning
confidence: 99%