2013
DOI: 10.1002/sec.696
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure revocable ID‐based signature in the standard model

Abstract: A signature scheme is one of the important primitives in modern cryptography, which may offer functionalities of user identification, non‐repudiation, and message authentication. With the advent of identity (ID)‐based public key systems with bilinear pairings defined on elliptic curves, many ID‐based signature schemes have been proposed. Like certificate‐based public key systems, any ID‐based public key system must provide a revocation method to revoke misbehaving users. There was little work on studying the r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 29 publications
(29 citation statements)
references
References 31 publications
(49 reference statements)
0
29
0
Order By: Relevance
“…In the adversary model, there are two types of adversaries, namely, Type I adversary (a curious CRA or an outsider) and Type II adversary (a revoked user). As compared with the adversary models of RIBS schemes presented in Tsai et al (2013b), Hung et al (2017), Jia et al (2017), three new key leakage queries, namely, the key extract leak query, time key update leak query and signing leak query are added to our new adversary model. These added leak queries allow an adversary to continuously extract fractional content of private/secret keys participated in the computation rounds.…”
Section: Contribution and Organizationmentioning
confidence: 99%
See 4 more Smart Citations
“…In the adversary model, there are two types of adversaries, namely, Type I adversary (a curious CRA or an outsider) and Type II adversary (a revoked user). As compared with the adversary models of RIBS schemes presented in Tsai et al (2013b), Hung et al (2017), Jia et al (2017), three new key leakage queries, namely, the key extract leak query, time key update leak query and signing leak query are added to our new adversary model. These added leak queries allow an adversary to continuously extract fractional content of private/secret keys participated in the computation rounds.…”
Section: Contribution and Organizationmentioning
confidence: 99%
“…Computability:ê(g, g) rs can be computed efficiently for any r, s ∈ Z * p . For the detailed properties and settings with regard to bilinear groups, please refer to Boneh and Franklin (2001), Tsai et al (2013b), Lynn (2015), Scott (2011).…”
Section: Bilinear Groupsmentioning
confidence: 99%
See 3 more Smart Citations