Generic Construction of Forward-Secure Revocable Identity-Based Signature and Lattice-Based Instantiations
Forward-secure revocation is a powerful cryptographic technique to alleviate key exposure attacks on identity-based cryptosystems. In recent years, quantum computers have made some breakthroughs, so in the foreseeable future, existing cryptographic systems will be subject to quantum attacks. However...
Saved in:
| Published in | Security and communication networks Vol. 2022; pp. 1 - 12 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
London
Hindawi
16.11.2022
John Wiley & Sons, Inc |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1939-0114 1939-0122 1939-0122 |
| DOI | 10.1155/2022/7494452 |
Cover
| Abstract | Forward-secure revocation is a powerful cryptographic technique to alleviate key exposure attacks on identity-based cryptosystems. In recent years, quantum computers have made some breakthroughs, so in the foreseeable future, existing cryptographic systems will be subject to quantum attacks. However, known forward-secure revocable identity-based signature (FS-RIBS) schemes were designed over bilinear pairing groups and may suffer from quantum computing attacks. To address this issue, this paper proposes a generic method to construct FS-RIBS schemes, taking (hierarchical) IBS schemes as a basic component. By instantiating it with some post-quantum (hierarchical) IBS schemes, e.g., lattice-based (hierarchical) IBS, we immediately obtain six FS-RIBS schemes under the hardness of the small integer solution problem, which is secure against quantum computing attacks. |
|---|---|
| AbstractList | Forward-secure revocation is a powerful cryptographic technique to alleviate key exposure attacks on identity-based cryptosystems. In recent years, quantum computers have made some breakthroughs, so in the foreseeable future, existing cryptographic systems will be subject to quantum attacks. However, known forward-secure revocable identity-based signature (FS-RIBS) schemes were designed over bilinear pairing groups and may suffer from quantum computing attacks. To address this issue, this paper proposes a generic method to construct FS-RIBS schemes, taking (hierarchical) IBS schemes as a basic component. By instantiating it with some post-quantum (hierarchical) IBS schemes, e.g., lattice-based (hierarchical) IBS, we immediately obtain six FS-RIBS schemes under the hardness of the small integer solution problem, which is secure against quantum computing attacks. |
| Author | Zheng, Dong Gao, Wen Zhao, Qianqian He, Yan Qin, Baodong |
| Author_xml | – sequence: 1 givenname: Yan surname: He fullname: He, Yan organization: School of Cyberspace SecurityXi’an University of Posts and TelecommunicationsXi’an 710121Chinaxiyou.edu.cn – sequence: 2 givenname: Baodong orcidid: 0000-0001-7617-5462 surname: Qin fullname: Qin, Baodong organization: School of Cyberspace SecurityXi’an University of Posts and TelecommunicationsXi’an 710121Chinaxiyou.edu.cn – sequence: 3 givenname: Wen orcidid: 0000-0001-9923-068X surname: Gao fullname: Gao, Wen organization: School of Cyberspace SecurityXi’an University of Posts and TelecommunicationsXi’an 710121Chinaxiyou.edu.cn – sequence: 4 givenname: Dong orcidid: 0000-0002-3860-2037 surname: Zheng fullname: Zheng, Dong organization: School of Cyberspace SecurityXi’an University of Posts and TelecommunicationsXi’an 710121Chinaxiyou.edu.cn – sequence: 5 givenname: Qianqian surname: Zhao fullname: Zhao, Qianqian organization: Shanghai Research and Development Center for Micro-Nano ElectronicsShanghai 201210China |
| BookMark | eNqF0E1Lw0AQBuBFFGyrN39AwKPG7meyOWqxtVAQrJ7DZjPRLXG37m4s_fcmtHjU0wzMw8vwjtGpdRYQuiL4jhAhphRTOs15wbmgJ2hEClakmFB6-rsTfo7GIWwwzgjP-QhtFmDBG53MnA3RdzoaZxPXJHPnd8rX6Rp05yF5gW-nVdVCsqzBRhP36YMKUCdr825VHIiydbJSMRoNx9uyj1Q9VkNouEBnjWoDXB7nBL3NH19nT-nqebGc3a9STQseUyaqGlgjhWZYSyZknVWNyAgFibOCYclBAKsYJ4o0TEFVNZzlWSMV6Lximk1Qesjt7Fbtd6pty603n8rvS4LLoahyKKo8FtX764PfevfVQYjlxnXe9i-WNOeYiUwK2avbg9LeheCh-S_05sA_jK3VzvytfwAd7oUM |
| Cites_doi | 10.5755/j01.itc.47.3.18528 10.1080/00207160.2016.1190835 10.5755/j01.itc.43.3.5718 10.1016/j.ins.2022.02.027 10.1007/978-3-030-88052-1_19 10.3233/fi-2011-562 10.1007/11535218_33 10.20517/jsss.2020.28 10.1109/tifs.2014.2327758 10.1007/3-540-44647-8_13 10.1002/sec.696 10.1016/j.ins.2020.01.008 10.1504/ijesdf.2013.054403 10.1007/978-3-642-12929-2_14 10.1155/2020/1743421 10.1002/sec.1513 10.1007/s12652-017-0631-0 10.1016/j.compeleceng.2013.12.003 10.1016/j.compeleceng.2011.03.011 10.1631/fitee.1900318 10.1002/sec.531 10.1155/2017/7571201 |
| ContentType | Journal Article |
| Copyright | Copyright © 2022 Yan He et al. Copyright © 2022 Yan He et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| Copyright_xml | – notice: Copyright © 2022 Yan He et al. – notice: Copyright © 2022 Yan He et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| DBID | RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D ADTOC UNPAY |
| DOI | 10.1155/2022/7494452 |
| DatabaseName | Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | CrossRef Technology Research Database |
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1939-0122 |
| Editor | Masucci, Barbara |
| Editor_xml | – sequence: 1 givenname: Barbara surname: Masucci fullname: Masucci, Barbara |
| EndPage | 12 |
| ExternalDocumentID | 10.1155/2022/7494452 10_1155_2022_7494452 |
| GrantInformation_xml | – fundername: Science and Technology on Communication Security Laboratory grantid: 6142103190101 – fundername: National Natural Science Foundation of China grantid: 62002288; 61872292 – fundername: Natural Science Foundation of Shanghai grantid: 19ZR1454100 – fundername: Basic Research Program of Qinghai Province grantid: 2020-ZJ-701 |
| GroupedDBID | .4S .DC 05W 0R~ 123 1OC 3SF 4.4 52U 5DZ 66C 8-1 8UM AAESR AAFWJ AAJEY AAONW ACGFO ADBBV ADIZJ AENEX AFBPY AFKRA AJXKR ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS ATUGU AZVAB BCNDV BENPR BGLVJ BHBCM BNHUX BOGZA BRXPI CCPQU CS3 DR2 DU5 EBS EIS F1Z G-S GROUPED_DOAJ HCIFZ HZ~ IAO ICD ITC IX1 K7- LITHE MY. MY~ NNB O9- OIG OK1 P2P PIMPY RHU RHW RHX TH9 TUS W99 WBKPD XV2 24P AAMMB AAYXX ACCMX ADMLS AEFGJ AGXDD AIDQK AIDYY CITATION H13 PUEGO 7SC 7SP 8FD JQ2 L7M L~C L~D 31~ AAEVG AANHP AAZKR ACBWZ ACRPL ACXQS ACYXJ ADNMO ADTOC AEIMD AGQPQ AMBMR ASPBG AVWKF AZFZN BDRZF EJD FEDTE GODZA HVGLF LH4 LW6 ROL SUPJJ UNPAY |
| ID | FETCH-LOGICAL-c294t-35bde3f85c30c8358d6bf5612e80693084e5e3b341a1f3aebbf4376f8aec7b3c3 |
| IEDL.DBID | RHX |
| ISSN | 1939-0114 1939-0122 |
| IngestDate | Tue Aug 19 23:20:02 EDT 2025 Fri Jul 25 20:53:29 EDT 2025 Wed Oct 01 02:26:12 EDT 2025 Sun Jun 02 18:53:03 EDT 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licenses/by/4.0 cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c294t-35bde3f85c30c8358d6bf5612e80693084e5e3b341a1f3aebbf4376f8aec7b3c3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-7617-5462 0000-0001-9923-068X 0000-0002-3860-2037 |
| OpenAccessLink | https://dx.doi.org/10.1155/2022/7494452 |
| PQID | 2740356858 |
| PQPubID | 1046363 |
| PageCount | 12 |
| ParticipantIDs | unpaywall_primary_10_1155_2022_7494452 proquest_journals_2740356858 crossref_primary_10_1155_2022_7494452 hindawi_primary_10_1155_2022_7494452 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2022-11-16 |
| PublicationDateYYYYMMDD | 2022-11-16 |
| PublicationDate_xml | – month: 11 year: 2022 text: 2022-11-16 day: 16 |
| PublicationDecade | 2020 |
| PublicationPlace | London |
| PublicationPlace_xml | – name: London |
| PublicationTitle | Security and communication networks |
| PublicationYear | 2022 |
| Publisher | Hindawi John Wiley & Sons, Inc |
| Publisher_xml | – name: Hindawi – name: John Wiley & Sons, Inc |
| References | 22 H. Krawczyk (25) 2005 G. Wu (24) 26 X. Xiang (12) 2015; 10 M. Bellare (20) 1999 29 G. Craig (32) 2007 J. Wei (27) 2021; 18 S. Agrawal (33) 2015 S. Agrawal (35) 2010 R. Anderson (19) 1997 Y. Liu (23) D. Boneh (2) 2001 B. Qin (17) 2021 30 31 J. H. Seo (4) 2013 10 11 34 13 14 15 16 18 S. Adi (1) 1984 M. Rückert (28) 2010 A. Ge (3) 2019 5 6 Y. Sun (7) 8 9 21 |
| References_xml | – ident: 10 doi: 10.5755/j01.itc.47.3.18528 – ident: 16 doi: 10.1080/00207160.2016.1190835 – ident: 8 doi: 10.5755/j01.itc.43.3.5718 – start-page: 626 ident: 24 article-title: An efficient identity-based forward secure signature scheme from lattices – ident: 15 doi: 10.1016/j.ins.2022.02.027 – volume-title: Annual International Conference on the Theory and Applications of Cryptographic Techniques year: 2015 ident: 33 article-title: Efficient Lattice (H)ibe in the Standard Model – start-page: 321 volume-title: International Conference on Information and Communications Security year: 2021 ident: 17 article-title: Forward-secure revocable identity-based encryption doi: 10.1007/978-3-030-88052-1_19 – year: 2007 ident: 32 article-title: Trapdoors for hard lattices and new cryptographic constructions – year: 1997 ident: 19 article-title: Two Remarks on Public Key Cryptology – ident: 21 doi: 10.3233/fi-2011-562 – start-page: 216 volume-title: International Workshop on Public Key Cryptography year: 2013 ident: 4 article-title: Revocable identity-based encryption revisited: security model and construction – start-page: 546 volume-title: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference year: 2005 ident: 25 article-title: HMQV: a high-performance secure diffie-hellman protocol doi: 10.1007/11535218_33 – ident: 26 doi: 10.20517/jsss.2020.28 – start-page: 47 volume-title: Workshop on the Theory and Application of Cryptographic Techniques year: 1984 ident: 1 article-title: Identity-based cryptosystems and signature schemes – ident: 5 doi: 10.1109/tifs.2014.2327758 – start-page: 98 volume-title: Annual Cryptology Conference year: 2010 ident: 35 article-title: Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical ibe – volume-title: Advances in Crytology, Crypto year: 2001 ident: 2 article-title: Identity-based encryption from the weil pairing doi: 10.1007/3-540-44647-8_13 – volume: 10 start-page: 25 year: 2015 ident: 12 article-title: Adaptive secure revocable identity-based signature scheme over lattices publication-title: Computer Engineering – ident: 6 doi: 10.1002/sec.696 – ident: 13 doi: 10.1016/j.ins.2020.01.008 – ident: 30 doi: 10.1504/ijesdf.2013.054403 – start-page: 363 ident: 7 article-title: Revocable identity-based signature without pairing – start-page: 179 ident: 23 article-title: Id-based forward-secure signature scheme from the bilinear pairings – start-page: 182 volume-title: International Workshop on Post-Quantum Cryptography year: 2010 ident: 28 article-title: Strongly unforgeable signatures and hierarchical identity-based signatures from lattices without random oracles doi: 10.1007/978-3-642-12929-2_14 – ident: 14 doi: 10.1155/2020/1743421 – volume: 18 start-page: 2301 issue: 5 year: 2021 ident: 27 article-title: RS-HABE: revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud publication-title: IEEE Transactions on Dependable and Secure Computing – ident: 9 doi: 10.1002/sec.1513 – ident: 11 doi: 10.1007/s12652-017-0631-0 – ident: 18 doi: 10.1016/j.compeleceng.2013.12.003 – ident: 22 doi: 10.1016/j.compeleceng.2011.03.011 – ident: 31 doi: 10.1631/fitee.1900318 – start-page: 405 volume-title: Public-Key Cryptography-PKC 2019-22nd IACR International Conference On Practice And Theory Of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, Volume 11442 of Lecture Notes In Computer Science year: 2019 ident: 3 article-title: Identity-based broadcast encryption with efficient revocation – start-page: 431 volume-title: Annual International Cryptology Conference year: 1999 ident: 20 article-title: A forward-secure digital signature scheme – ident: 29 doi: 10.1002/sec.531 – ident: 34 doi: 10.1155/2017/7571201 |
| SSID | ssj0061474 |
| Score | 2.2560976 |
| Snippet | Forward-secure revocation is a powerful cryptographic technique to alleviate key exposure attacks on identity-based cryptosystems. In recent years, quantum... |
| SourceID | unpaywall proquest crossref hindawi |
| SourceType | Open Access Repository Aggregation Database Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Algorithms Computer systems Construction Cryptography Digital signatures Efficiency Quantum computers Quantum computing |
| SummonAdditionalLinks | – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED90Q9QHv8XplDyob51dk3QdPqk4VFREHSgIJZ86Hd1wVdG_3qRN1fmg4ltLQ5reHbnfpXe_A1iXjFneN-4J3Aw9EnDssTAwtmzhq4-xZBkdw8lpeNAmR1f0agS2i1oYaSnie0wOanc2Jn3pZLu1k-tgayASG64HWw3SJISaoFDqUSiH1ADxEpTbp2c71_l_ZJsFVCef10FQpL1TOjTFkEMac28dwpvjT0mfvb6wbveL62lNw02x6Dzj5KH2lPKaePvG5_jPr5qBKQdJ0U5uQ7MwopI5mPxCVDgP9xk7dUcg29-zYJxFPY1avccs7TY7tlfoXD0b38i7CrkC4Fdv17hJiS46tzmFKGKJRMcstTl37tlhhlDT3EYGC9Bu7V_uHXiuS4MngiZJPUy5VFhHVGBfGDwXyZBr23NTRb7tsxgRRRXmxluyusZMca6J2dV0xJRocCzwIpSSXqKWAAmhRcQojxpRSJjCzMSOWJtlK-HzBpMV2ChUFfdzMo44C2Ioja38Yie_Cqw7Of8yrFooOS50EZso3cfUsvJXYPND8T_Os_zXgSswYW9tKWM9rELJ6EutGkyT8jVnu-_1QvKC priority: 102 providerName: Unpaywall |
| Title | Generic Construction of Forward-Secure Revocable Identity-Based Signature and Lattice-Based Instantiations |
| URI | https://dx.doi.org/10.1155/2022/7494452 https://www.proquest.com/docview/2740356858 https://downloads.hindawi.com/journals/scn/2022/7494452.pdf |
| UnpaywallVersion | publishedVersion |
| Volume | 2022 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 issn: 1939-0122 databaseCode: ADMLS dateStart: 20110501 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVWIB databaseName: Wiley Online Library - Core collection (SURFmarket) issn: 1939-0122 databaseCode: DR2 dateStart: 20070101 customDbUrl: isFulltext: true eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 providerName: Wiley-Blackwell – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0061474 issn: 1939-0122 databaseCode: 24P dateStart: 20170101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwEA46EfVB_InTOfIwfSt2TdJmj1McU3TIdDCfSpImOhndcNOx_95Lm4pTUB9Lf3KX3vddcvkOoVoihNV9k54ijdCjgSSeCAMYy5a--oQkIpNjuO2E7R697rO-E0ma_FzCB7Sz6XlwFtEGpQxi7TIPbeVWt90vAi4ATOQWj23pT50W9e3f7l1AntVnm_LOBgvEcu0tHYv5TAyHXzCmtYU2HTnEzdyb22hJpzto44tk4C56yXSiBwrbTpuF9iseGdwavWYFsNkEusZd_Q4oJYcau624c-8cACvB94OnXMwTizTBN2Jqq9_cuauMK05zb032UK91-XDR9ly_BE8FDTr1CJOJJoYzRXwFzIonoTS2-6Xmvu14yKlmmkjALVE3RGgpDYX4YrjQKpJEkX1USkepPkBYKaO4YJJHPKRCEwFZHDHw2Vr5MhJJGZ0UtozHuSxGnKUTjMXW5rGzeRnVnKH_uKxSeCF2_9AkhnzZJ8zq45fR6adnfn3O4f9ed4TW7aHdUlgPK6gE3tLHwC2msgqsuhtUs_FVRSu9zl3z8QNbFskN |
| linkProvider | Hindawi Publishing |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED90Q9QHv8XplDyob51dk3QdPqk4VFREHSgIJZ86Hd1wVdG_3qRN1fmg4ltLQ5reHbnfpXe_A1iXjFneN-4J3Aw9EnDssTAwtmzhq4-xZBkdw8lpeNAmR1f0agS2i1oYaSnie0wOanc2Jn3pZLu1k-tgayASG64HWw3SJISaoFDqUSiH1ADxEpTbp2c71_l_ZJsFVCef10FQpL1TOjTFkEMac28dwpvjT0mfvb6wbveL62lNw02x6Dzj5KH2lPKaePvG5_jPr5qBKQdJ0U5uQ7MwopI5mPxCVDgP9xk7dUcg29-zYJxFPY1avccs7TY7tlfoXD0b38i7CrkC4Fdv17hJiS46tzmFKGKJRMcstTl37tlhhlDT3EYGC9Bu7V_uHXiuS4MngiZJPUy5VFhHVGBfGDwXyZBr23NTRb7tsxgRRRXmxluyusZMca6J2dV0xJRocCzwIpSSXqKWAAmhRcQojxpRSJjCzMSOWJtlK-HzBpMV2ChUFfdzMo44C2Ioja38Yie_Cqw7Of8yrFooOS50EZso3cfUsvJXYPND8T_Os_zXgSswYW9tKWM9rELJ6EutGkyT8jVnu-_1QvKC |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Generic+Construction+of+Forward-Secure+Revocable+Identity-Based+Signature+and+Lattice-Based+Instantiations&rft.jtitle=Security+and+communication+networks&rft.au=He%2C+Yan&rft.au=Qin%2C+Baodong&rft.au=Gao%2C+Wen&rft.au=Zheng%2C+Dong&rft.date=2022-11-16&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F7494452&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon |