Efficient escrow-free identity-based signature

  • Authors:
  • Yunmei Zhang;Joseph K. Liu;Xinyi Huang;Man Ho Au;Willy Susilo

  • Affiliations:
  • Centre for Computer and Information Security Research(CCISR), School of Computer Science and Software Engineering, University of Wollongong, Australia;Cryptography and Security Department, Institute for Infocomm Research, Singapore;School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, Fujian, China;Centre for Computer and Information Security Research(CCISR), School of Computer Science and Software Engineering, University of Wollongong, Australia;Centre for Computer and Information Security Research(CCISR), School of Computer Science and Software Engineering, University of Wollongong, Australia

  • Venue:
  • ProvSec'12 Proceedings of the 6th international conference on Provable Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

The notion of identity-based signature scheme (IBS) has been proven useful in some scenarios where relying on the validity of the certificates is impractical. Nevertheless, one remaining inherent problem that hinders the adoption of this cryptographic primitive in practice is due to the key escrow problem, where the private key generator (PKG) can always impersonate the user in the system. In 2010, Yuen et al. proposed the notion of IBS that does not suffer from the key escrow problem. Nevertheless, their approach relies on the judge who will later blame the malicious PKG when such a dispute occurs, assuming that the PKG is willing to collaborate. Although the approach is attractive, but unfortunately it is impractical since the malicious PKG may just refuse to collaborate when such an incident happens. In this paper, we propose a new escrow-free IBS, which enjoys three main advantages, namely key escrow free, practical and very efficient. We present a generic intuition as well as an efficient instantiation. In our approach, there is no judge involvement required, as the public can determine the malicious behaviour of PKG when such an incident happens. Further, the signature size of our instantiation is only two group elements, which outperforms the existing constructions in the literature.