Escrow-Less Identity-Based Signature Scheme with Outsourced Protection in Cloud Computing
- PDF / 1,715,619 Bytes
- 22 Pages / 439.37 x 666.142 pts Page_size
- 45 Downloads / 218 Views
Escrow‑Less Identity‑Based Signature Scheme with Outsourced Protection in Cloud Computing Mahender Kumar1 · Satish Chand1
© Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract The identity-based cryptosystem (IBC) outfits with the most beneficial key management procedures. The IBC is bounded to the small network system due to the internal key escrow problem, which leads to two other problems: key abusing and user slandering problems. Some solutions that address the key escrow problem are certificate-less cryptosystems and multiple authorities-based IBC. However, they are expensive in terms of computation or loss of the identity-based feature. This paper presents an escrow-less identity-based signature (EL-IBS) scheme, where we employ one key generation center that authenticates a user and many authorities that issue a protected private key share without user authentication. We also outsource the key protection overhead to the cloud privacy centers. We proved that the our EL-IBS scheme is existential unforgeable, key abusing and existential user slandering secured against adaptively chosen message attack under the random oracle model and the well-known computational Diffie–Hellman problem. Keywords Identity-based signature · Key-escrow problem · Key-abusing problem · User slandering problem · Bilinear pairing
1 Introduction The digital signature is a cryptographic mechanism that ensures the user’s authenticity, non-repudiation, and data integrity. However, in traditional digital signature (RSA) [1], distributing a public key in an extensive network is challenging. It needs a trusted third party, namely certificate authority (CA) that generates a digital certificate for ensuring the authenticity of a public key of user and links it to his respective identity. The CA authenticates the digital certificates using its secret key and stores them in public key infrastructure (PKI). Shamir et al. [2] emancipated such overhead by considering user’s identity as his public key [2]. Shamir was first to present the digital signature identity-based setting (IBS) scheme, which is secured against the hardness of factoring large integers. In 2001, two * Mahender Kumar [email protected] Satish Chand [email protected] 1
School of Computer and Systems Sciences, JawaharLal Nehru University, New Delhi, India
13
Vol.:(0123456789)
M. Kumar, S. Chand
identity-based encryption (IBE) schemes were developed. In 2001, Boneh et al. [3] were the first to construct identity-based encryption (IBE) using pairing. Another IBE scheme, in same year, is proposed by the cock based on residuosity problem [4]. Since then, there have been discussed many IBE/IBS systems and their modifications [5–9]. In the IBS scheme [2], the user’s personal identity, such as passport number, e-mail address, and name, is considered as its public key and the corresponding private key corresponding is received from the private key generator (PKG), a trusted third party. The PKG authenticates the user’s ID and issues a privat
Data Loading...