Abstract:
Identity-based cryptosystems mean that public keys can be directly derived from user identifiers, such as telephone numbers, email addresses, and social insurance number,...Show MoreMetadata
Abstract:
Identity-based cryptosystems mean that public keys can be directly derived from user identifiers, such as telephone numbers, email addresses, and social insurance number, and so on. So they can simplify key management procedures of certificate-based public key infrastructures and can be used to realize authentication in blockchain. Linearly homomorphic signature schemes allow to perform linear computations on authenticated data. And the correctness of the computation can be publicly verified. Although a series of homomorphic signature schemes have been designed recently, there are few homomorphic signature schemes designed in identity-based cryptography. In this paper, we construct a new ID-based linear homomorphic signature scheme, which avoids the shortcomings of the use of public-key certificates. The scheme is proved secure against existential forgery on adaptively chosen message and ID attack under the random oracle model. The ID-based linearly homomorphic signature schemes can be applied in e-business and cloud computing. Finally, we show how to apply it to realize authentication in blockchain.
Published in: IEEE Access ( Volume: 6)
Funding Agency:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Signature Scheme ,
- Homomorphic Signature ,
- Cloud Computing ,
- Authentication ,
- Email Address ,
- Telephone Number ,
- Random Oracle ,
- Public Key Infrastructure ,
- Random Oracle Model ,
- Calculation Results ,
- Hash Function ,
- Information Security ,
- Output Of Algorithm ,
- Secret Key ,
- Typical Signature ,
- Bilinear Map ,
- Key Generation ,
- Independent Vectors ,
- Security Model ,
- Security Parameter ,
- Probabilistic Polynomial Time ,
- Security Proof ,
- Description Of Scheme
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Signature Scheme ,
- Homomorphic Signature ,
- Cloud Computing ,
- Authentication ,
- Email Address ,
- Telephone Number ,
- Random Oracle ,
- Public Key Infrastructure ,
- Random Oracle Model ,
- Calculation Results ,
- Hash Function ,
- Information Security ,
- Output Of Algorithm ,
- Secret Key ,
- Typical Signature ,
- Bilinear Map ,
- Key Generation ,
- Independent Vectors ,
- Security Model ,
- Security Parameter ,
- Probabilistic Polynomial Time ,
- Security Proof ,
- Description Of Scheme
- Author Keywords