Journal of Guangdong University of Technology ›› 2007, Vol. 24 ›› Issue (4): 63-66.

• Comprehensive Studies • Previous Articles     Next Articles

Online/Offline Signature Based on Bilinear Pairings

  

  1. (1.Information,Machinery and Electronics College,Guangzhou University,GuangZhou 510000,China;2.Faculty of Applied Mathematics,Guangdong University of Technology,Guangzhou 510090,China)
  • Online:2007-11-08 Published:2007-11-08

Abstract: Online/Offline signatures are used in a particular scenario where the signer must respond quickly once the message to be signed is presented.This paper presents two online/offline signature schemes from bilinear pairings.Without the random oracle assumption,these two schemes are proved secure.Furthermore,without increasing the overall computation,the new schemes’ online computation requires only about one fourth of that of the old schemes

Key words: digital signatures; online/offline signatures; bilinear pairings; q-SDH assumption; LRSW assumption;

[1] Shimon Even,Oded Goldreich,Silvio Micali.On-line/off-linedigital signatures. Proc CRYPTO89 . 1990

[2] Adi Shamir,Yael Tauman.Improved online/offine signatureschemes. Advances in Cryptology——CRYPTO’2001In-ternational Association for Cryptologic Research . 2001

[3] Hugo Krawczyk,and Tal Rabin.Chameleon signatures. Pro-ceedings ofthe Symposium on Network and Distributed Sys-tems Security(NDSS’00) . 2000

[4] GAO Chong-zhi,,YAO Zheng-an.How to Authenticate RealTime Streams Using Improved Online/Offline Signatures. Lecture Notes in Computer Science . 2005

[5] Mihir Bellare,Phillip Rogaway.Random oracles are practi-cal:Aparadigm for designing efficient protocols. Pro-ceedings ofthe1st ACM Conference on Computer and Com-munications Security . 1993

[6] Dan Boneh,,Xavier Boyen.Short signatures without randomoracles. Advances in Cryptology Eurocrypt2005 . 2004

[7] Shaffi Goldwasser,Silvio Micali,Ron L Rivest.A digital sig-nature scheme secure against adaptive chosen-message at-tacks. SIAM Journal on Computing . 1988

[8] Dan Boneh,Ben Lynn,Hovav Shacham.Short signaturesfrom the weil pairing. ASIACRYPT . 2001

[9] Mitsunari,Sakai,Kasahara.Anewtraitor tracing. TIE-ICE:IEICE transactions on Communications/Electronics/Information and Systems . 2002

[10] Jan Camenisch,Anna Lysyanskaya.Signature schemes andanonymous credentials from bilinear maps. CRYPTO . 2004

[11] Anna Lysyanskaya,,Ronald L,Rivest,et al.Pseudonym sys-tems. Selected Areas in Cryptography . 1999
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!