Authors
Kenneth G Paterson, Jacob CN Schuldt
Publication date
2006/7/3
Book
Australasian conference on information security and privacy
Pages
207-222
Publisher
Springer Berlin Heidelberg
Description
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based signatures. This folklore construction method leads to schemes that are somewhat inefficient and leaves open the problem of finding more efficient direct constructions. We present the first such construction. Our scheme is obtained from a modification of Waters’ recently proposed identity-based encryption scheme. It is computationally efficient and the signatures are short. The scheme’s security is proven in the standard model and rests on the hardness of the computational Diffie-Hellman problem in groups equipped with a pairing.
Total citations
2006200720082009201020112012201320142015201620172018201920202021202220232024617343241424948381727272822102111165
Scholar articles
KG Paterson, JCN Schuldt - Australasian conference on information security and …, 2006