The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Le système de partage de clés basé sur l'identification est l'un des sujets importants dans la gestion des clés, et le système de prédistribution des clés (KPS) est l'une des principales divisions de ces systèmes de partage de clés. Dans KPS, afin de partager une clé commune entre les participants, l'un des participants doit simplement introduire la valeur d'identification de son partenaire dans son algorithme secret. Contrairement à ses propriétés remarquables et à sa grande contribution au domaine de la gestion des clés pour la signature numérique, il présente également des inconvénients. Dans cet article, nous proposons un schéma de signature efficace sur l'infrastructure KPS capable de surmonter les difficultés rencontrées. Il est démontré que si un système de partage de clés basé sur l'ID appartenant à KPS est fourni, le nouveau schéma de signature numérique peut être utilisé directement. De plus, ce schéma de signature s’avère sécurisé si le logarithme discret est raisonnablement complexe. Il existe déjà d'autres schémas de signature numérique également basés sur KPS, mais ils contiennent des défauts inévitables : son vérificateur est restreint et un module inviolable (TRM) est requis. Notre méthode a résolu ces problèmes. Dans notre schéma de signature, il est garanti que toutes les signatures sont authentifiées par n'importe quelle entité, ce qui est basé sur le comportement inhérent du générateur de clé et non sur une clé commune. De plus, TRM n’est pas requis dans notre schéma. Afin de décrire notre nouveau schéma, un nouveau concept d'"homomorphisme unidirectionnel" est introduit.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Tsuyoshi NISHIOKA, Goichiro HANAOKA, Hideki IMAI, "A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures" in IEICE TRANSACTIONS on Fundamentals,
vol. E84-A, no. 1, pp. 214-221, January 2001, doi: .
Abstract: ID-based key sharing scheme is one of the important topics in Key management, and the Key Predistiribution System (KPS) is one of the major divisions of such key sharing schemes. In KPS, in order to share a common key between the participants, one of the participants need to simply feed-in his partner's identifier value into their secret-algorithm. In contrast to its such remarkable property and its high contribution to the field of key management for digital signature, it has downsides as well. In this paper, we propose an efficient signature scheme on the KPS infrastructure that can overcome such difficulties that are faced. It is shown that if an ID-based key sharing system belonging to KPS is provided, the new digital signature scheme can be used straightforwardly. Moreover, this signature scheme is proven to be secure if the discrete logarithm is reasonably complex. There already exists other digital signature scheme which are also based on KPS, but they contain inevitable flaws: its verifier is restricted and a tamper resistant module(TRM) is required. Our method resolved these problems. In our signature scheme, it is an ensured fact that, all signatures are authenticated by any entity, which is based on the inherence behavior of key generator and not of some common key. Moreover, TRM is not required in our scheme. In order to describe our new scheme, a new concept of "one-way homomorphism" is introduced.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e84-a_1_214/_p
Copier
@ARTICLE{e84-a_1_214,
author={Tsuyoshi NISHIOKA, Goichiro HANAOKA, Hideki IMAI, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures},
year={2001},
volume={E84-A},
number={1},
pages={214-221},
abstract={ID-based key sharing scheme is one of the important topics in Key management, and the Key Predistiribution System (KPS) is one of the major divisions of such key sharing schemes. In KPS, in order to share a common key between the participants, one of the participants need to simply feed-in his partner's identifier value into their secret-algorithm. In contrast to its such remarkable property and its high contribution to the field of key management for digital signature, it has downsides as well. In this paper, we propose an efficient signature scheme on the KPS infrastructure that can overcome such difficulties that are faced. It is shown that if an ID-based key sharing system belonging to KPS is provided, the new digital signature scheme can be used straightforwardly. Moreover, this signature scheme is proven to be secure if the discrete logarithm is reasonably complex. There already exists other digital signature scheme which are also based on KPS, but they contain inevitable flaws: its verifier is restricted and a tamper resistant module(TRM) is required. Our method resolved these problems. In our signature scheme, it is an ensured fact that, all signatures are authenticated by any entity, which is based on the inherence behavior of key generator and not of some common key. Moreover, TRM is not required in our scheme. In order to describe our new scheme, a new concept of "one-way homomorphism" is introduced.},
keywords={},
doi={},
ISSN={},
month={January},}
Copier
TY - JOUR
TI - A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 214
EP - 221
AU - Tsuyoshi NISHIOKA
AU - Goichiro HANAOKA
AU - Hideki IMAI
PY - 2001
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E84-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2001
AB - ID-based key sharing scheme is one of the important topics in Key management, and the Key Predistiribution System (KPS) is one of the major divisions of such key sharing schemes. In KPS, in order to share a common key between the participants, one of the participants need to simply feed-in his partner's identifier value into their secret-algorithm. In contrast to its such remarkable property and its high contribution to the field of key management for digital signature, it has downsides as well. In this paper, we propose an efficient signature scheme on the KPS infrastructure that can overcome such difficulties that are faced. It is shown that if an ID-based key sharing system belonging to KPS is provided, the new digital signature scheme can be used straightforwardly. Moreover, this signature scheme is proven to be secure if the discrete logarithm is reasonably complex. There already exists other digital signature scheme which are also based on KPS, but they contain inevitable flaws: its verifier is restricted and a tamper resistant module(TRM) is required. Our method resolved these problems. In our signature scheme, it is an ensured fact that, all signatures are authenticated by any entity, which is based on the inherence behavior of key generator and not of some common key. Moreover, TRM is not required in our scheme. In order to describe our new scheme, a new concept of "one-way homomorphism" is introduced.
ER -