Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We propose the identity-based signature (IBS) scheme resilient to ephemerals leakage and setup. The scheme is applicable to scenarios, where signers can not trust thoroughly the signing devices, and doubts about the fairness of randomness the hardware and the operating system generate are justified. Our construction is based on the lightweight IBS by Galindo and Garcia. We present a formal security model for IBS in which all values coming from randomness source in signing procedure are leaked or set by adversary. We argue that the original scheme is vulnerable to universal forgery in our security model. We give details on our modified construction and provide a formal security proof in Random Oracle Model, claiming that even such a strong adversary cannot forge a signature in our scheme.

Cite

CITATION STYLE

APA

Krzywiecki, Ł., Słowik, M., & Szala, M. (2019). Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11879 LNCS, pp. 310–324). Springer. https://doi.org/10.1007/978-3-030-34339-2_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free