Identity-based signature (IBS) is a specific type of public-key signature (PKS) where any identity string ID can be used for the public key of a user. Although an IBS scheme can be constructed from any PKS scheme by using the certificate paradigm, it is still important to construct an efficient IBS scheme with short signature under the standard assumption without relying on random oracles. Recently, Kwon proposed an IBS scheme and claimed its strong unforgeability under the computational Diffie-Hellman (CDH) assumption. In this paper, we show that the security proof of Kwon is seriously flawed. To show the flaws, we first show that there exists a distinguisher that can distinguish the distribution of simulated signature from that of real si...
MasterEncryption and signature have been considered the fundamental cryptographic tools of public ke...
Abstract. Identity-based encryption (IBE) is a special asymmetric en-cryption method where a public ...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented ...
The only known construction of identity-based signatures that can be proven secure in the standard m...
AbstractCertificate-based cryptosystem combines the advantage of both traditional public key cryptos...
Since its induction, the selective-identity (sID) model for identity-based cryptosystems and its rel...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...
The notion of identity-based signature scheme (IBS) has been proven useful in some scenarios where r...
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Me...
AbstractA new identity-based short signature(IBS) is proposed in this paper. The new scheme is const...
Aggregate signatures allow anyone to combine different signatures signed by different signers on dif...
Abstract. We propose a variant of the “bonsai tree ” signature scheme, a lattice-based existentially...
In 2010, Rao et al. proposed an identity-based blind signature scheme based on bilinear pairings. Th...
We describe a short signature scheme which is existentially unforgeable under a chosen message attac...
MasterEncryption and signature have been considered the fundamental cryptographic tools of public ke...
Abstract. Identity-based encryption (IBE) is a special asymmetric en-cryption method where a public ...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented ...
The only known construction of identity-based signatures that can be proven secure in the standard m...
AbstractCertificate-based cryptosystem combines the advantage of both traditional public key cryptos...
Since its induction, the selective-identity (sID) model for identity-based cryptosystems and its rel...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...
The notion of identity-based signature scheme (IBS) has been proven useful in some scenarios where r...
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Me...
AbstractA new identity-based short signature(IBS) is proposed in this paper. The new scheme is const...
Aggregate signatures allow anyone to combine different signatures signed by different signers on dif...
Abstract. We propose a variant of the “bonsai tree ” signature scheme, a lattice-based existentially...
In 2010, Rao et al. proposed an identity-based blind signature scheme based on bilinear pairings. Th...
We describe a short signature scheme which is existentially unforgeable under a chosen message attac...
MasterEncryption and signature have been considered the fundamental cryptographic tools of public ke...
Abstract. Identity-based encryption (IBE) is a special asymmetric en-cryption method where a public ...
Digital signature, one of cryptographic primitives, provides the integrity, authentication and non-r...