Generic Construction of Forward-Secure Revocable Identity-Based Signature and Lattice-Based Instantiations

Forward-secure revocation is a powerful cryptographic technique to alleviate key exposure attacks on identity-based cryptosystems. In recent years, quantum computers have made some breakthroughs, so in the foreseeable future, existing cryptographic systems will be subject to quantum attacks. However...

Full description

Saved in:
Bibliographic Details
Published inSecurity and communication networks Vol. 2022; pp. 1 - 12
Main Authors He, Yan, Qin, Baodong, Gao, Wen, Zheng, Dong, Zhao, Qianqian
Format Journal Article
LanguageEnglish
Published London Hindawi 16.11.2022
John Wiley & Sons, Inc
Subjects
Online AccessGet full text
ISSN1939-0114
1939-0122
1939-0122
DOI10.1155/2022/7494452

Cover

Abstract Forward-secure revocation is a powerful cryptographic technique to alleviate key exposure attacks on identity-based cryptosystems. In recent years, quantum computers have made some breakthroughs, so in the foreseeable future, existing cryptographic systems will be subject to quantum attacks. However, known forward-secure revocable identity-based signature (FS-RIBS) schemes were designed over bilinear pairing groups and may suffer from quantum computing attacks. To address this issue, this paper proposes a generic method to construct FS-RIBS schemes, taking (hierarchical) IBS schemes as a basic component. By instantiating it with some post-quantum (hierarchical) IBS schemes, e.g., lattice-based (hierarchical) IBS, we immediately obtain six FS-RIBS schemes under the hardness of the small integer solution problem, which is secure against quantum computing attacks.
AbstractList Forward-secure revocation is a powerful cryptographic technique to alleviate key exposure attacks on identity-based cryptosystems. In recent years, quantum computers have made some breakthroughs, so in the foreseeable future, existing cryptographic systems will be subject to quantum attacks. However, known forward-secure revocable identity-based signature (FS-RIBS) schemes were designed over bilinear pairing groups and may suffer from quantum computing attacks. To address this issue, this paper proposes a generic method to construct FS-RIBS schemes, taking (hierarchical) IBS schemes as a basic component. By instantiating it with some post-quantum (hierarchical) IBS schemes, e.g., lattice-based (hierarchical) IBS, we immediately obtain six FS-RIBS schemes under the hardness of the small integer solution problem, which is secure against quantum computing attacks.
Author Zheng, Dong
Gao, Wen
Zhao, Qianqian
He, Yan
Qin, Baodong
Author_xml – sequence: 1
  givenname: Yan
  surname: He
  fullname: He, Yan
  organization: School of Cyberspace SecurityXi’an University of Posts and TelecommunicationsXi’an 710121Chinaxiyou.edu.cn
– sequence: 2
  givenname: Baodong
  orcidid: 0000-0001-7617-5462
  surname: Qin
  fullname: Qin, Baodong
  organization: School of Cyberspace SecurityXi’an University of Posts and TelecommunicationsXi’an 710121Chinaxiyou.edu.cn
– sequence: 3
  givenname: Wen
  orcidid: 0000-0001-9923-068X
  surname: Gao
  fullname: Gao, Wen
  organization: School of Cyberspace SecurityXi’an University of Posts and TelecommunicationsXi’an 710121Chinaxiyou.edu.cn
– sequence: 4
  givenname: Dong
  orcidid: 0000-0002-3860-2037
  surname: Zheng
  fullname: Zheng, Dong
  organization: School of Cyberspace SecurityXi’an University of Posts and TelecommunicationsXi’an 710121Chinaxiyou.edu.cn
– sequence: 5
  givenname: Qianqian
  surname: Zhao
  fullname: Zhao, Qianqian
  organization: Shanghai Research and Development Center for Micro-Nano ElectronicsShanghai 201210China
BookMark eNqF0E1Lw0AQBuBFFGyrN39AwKPG7meyOWqxtVAQrJ7DZjPRLXG37m4s_fcmtHjU0wzMw8vwjtGpdRYQuiL4jhAhphRTOs15wbmgJ2hEClakmFB6-rsTfo7GIWwwzgjP-QhtFmDBG53MnA3RdzoaZxPXJHPnd8rX6Rp05yF5gW-nVdVCsqzBRhP36YMKUCdr825VHIiydbJSMRoNx9uyj1Q9VkNouEBnjWoDXB7nBL3NH19nT-nqebGc3a9STQseUyaqGlgjhWZYSyZknVWNyAgFibOCYclBAKsYJ4o0TEFVNZzlWSMV6Lximk1Qesjt7Fbtd6pty603n8rvS4LLoahyKKo8FtX764PfevfVQYjlxnXe9i-WNOeYiUwK2avbg9LeheCh-S_05sA_jK3VzvytfwAd7oUM
Cites_doi 10.5755/j01.itc.47.3.18528
10.1080/00207160.2016.1190835
10.5755/j01.itc.43.3.5718
10.1016/j.ins.2022.02.027
10.1007/978-3-030-88052-1_19
10.3233/fi-2011-562
10.1007/11535218_33
10.20517/jsss.2020.28
10.1109/tifs.2014.2327758
10.1007/3-540-44647-8_13
10.1002/sec.696
10.1016/j.ins.2020.01.008
10.1504/ijesdf.2013.054403
10.1007/978-3-642-12929-2_14
10.1155/2020/1743421
10.1002/sec.1513
10.1007/s12652-017-0631-0
10.1016/j.compeleceng.2013.12.003
10.1016/j.compeleceng.2011.03.011
10.1631/fitee.1900318
10.1002/sec.531
10.1155/2017/7571201
ContentType Journal Article
Copyright Copyright © 2022 Yan He et al.
Copyright © 2022 Yan He et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2022 Yan He et al.
– notice: Copyright © 2022 Yan He et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
DOI 10.1155/2022/7494452
DatabaseName Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef

Technology Research Database
Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1939-0122
Editor Masucci, Barbara
Editor_xml – sequence: 1
  givenname: Barbara
  surname: Masucci
  fullname: Masucci, Barbara
EndPage 12
ExternalDocumentID 10.1155/2022/7494452
10_1155_2022_7494452
GrantInformation_xml – fundername: Science and Technology on Communication Security Laboratory
  grantid: 6142103190101
– fundername: National Natural Science Foundation of China
  grantid: 62002288; 61872292
– fundername: Natural Science Foundation of Shanghai
  grantid: 19ZR1454100
– fundername: Basic Research Program of Qinghai Province
  grantid: 2020-ZJ-701
GroupedDBID .4S
.DC
05W
0R~
123
1OC
3SF
4.4
52U
5DZ
66C
8-1
8UM
AAESR
AAFWJ
AAJEY
AAONW
ACGFO
ADBBV
ADIZJ
AENEX
AFBPY
AFKRA
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
ATUGU
AZVAB
BCNDV
BENPR
BGLVJ
BHBCM
BNHUX
BOGZA
BRXPI
CCPQU
CS3
DR2
DU5
EBS
EIS
F1Z
G-S
GROUPED_DOAJ
HCIFZ
HZ~
IAO
ICD
ITC
IX1
K7-
LITHE
MY.
MY~
NNB
O9-
OIG
OK1
P2P
PIMPY
RHU
RHW
RHX
TH9
TUS
W99
WBKPD
XV2
24P
AAMMB
AAYXX
ACCMX
ADMLS
AEFGJ
AGXDD
AIDQK
AIDYY
CITATION
H13
PUEGO
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
31~
AAEVG
AANHP
AAZKR
ACBWZ
ACRPL
ACXQS
ACYXJ
ADNMO
ADTOC
AEIMD
AGQPQ
AMBMR
ASPBG
AVWKF
AZFZN
BDRZF
EJD
FEDTE
GODZA
HVGLF
LH4
LW6
ROL
SUPJJ
UNPAY
ID FETCH-LOGICAL-c294t-35bde3f85c30c8358d6bf5612e80693084e5e3b341a1f3aebbf4376f8aec7b3c3
IEDL.DBID RHX
ISSN 1939-0114
1939-0122
IngestDate Tue Aug 19 23:20:02 EDT 2025
Fri Jul 25 20:53:29 EDT 2025
Wed Oct 01 02:26:12 EDT 2025
Sun Jun 02 18:53:03 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
https://creativecommons.org/licenses/by/4.0
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c294t-35bde3f85c30c8358d6bf5612e80693084e5e3b341a1f3aebbf4376f8aec7b3c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7617-5462
0000-0001-9923-068X
0000-0002-3860-2037
OpenAccessLink https://dx.doi.org/10.1155/2022/7494452
PQID 2740356858
PQPubID 1046363
PageCount 12
ParticipantIDs unpaywall_primary_10_1155_2022_7494452
proquest_journals_2740356858
crossref_primary_10_1155_2022_7494452
hindawi_primary_10_1155_2022_7494452
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-11-16
PublicationDateYYYYMMDD 2022-11-16
PublicationDate_xml – month: 11
  year: 2022
  text: 2022-11-16
  day: 16
PublicationDecade 2020
PublicationPlace London
PublicationPlace_xml – name: London
PublicationTitle Security and communication networks
PublicationYear 2022
Publisher Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi
– name: John Wiley & Sons, Inc
References 22
H. Krawczyk (25) 2005
G. Wu (24)
26
X. Xiang (12) 2015; 10
M. Bellare (20) 1999
29
G. Craig (32) 2007
J. Wei (27) 2021; 18
S. Agrawal (33) 2015
S. Agrawal (35) 2010
R. Anderson (19) 1997
Y. Liu (23)
D. Boneh (2) 2001
B. Qin (17) 2021
30
31
J. H. Seo (4) 2013
10
11
34
13
14
15
16
18
S. Adi (1) 1984
M. Rückert (28) 2010
A. Ge (3) 2019
5
6
Y. Sun (7)
8
9
21
References_xml – ident: 10
  doi: 10.5755/j01.itc.47.3.18528
– ident: 16
  doi: 10.1080/00207160.2016.1190835
– ident: 8
  doi: 10.5755/j01.itc.43.3.5718
– start-page: 626
  ident: 24
  article-title: An efficient identity-based forward secure signature scheme from lattices
– ident: 15
  doi: 10.1016/j.ins.2022.02.027
– volume-title: Annual International Conference on the Theory and Applications of Cryptographic Techniques
  year: 2015
  ident: 33
  article-title: Efficient Lattice (H)ibe in the Standard Model
– start-page: 321
  volume-title: International Conference on Information and Communications Security
  year: 2021
  ident: 17
  article-title: Forward-secure revocable identity-based encryption
  doi: 10.1007/978-3-030-88052-1_19
– year: 2007
  ident: 32
  article-title: Trapdoors for hard lattices and new cryptographic constructions
– year: 1997
  ident: 19
  article-title: Two Remarks on Public Key Cryptology
– ident: 21
  doi: 10.3233/fi-2011-562
– start-page: 216
  volume-title: International Workshop on Public Key Cryptography
  year: 2013
  ident: 4
  article-title: Revocable identity-based encryption revisited: security model and construction
– start-page: 546
  volume-title: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference
  year: 2005
  ident: 25
  article-title: HMQV: a high-performance secure diffie-hellman protocol
  doi: 10.1007/11535218_33
– ident: 26
  doi: 10.20517/jsss.2020.28
– start-page: 47
  volume-title: Workshop on the Theory and Application of Cryptographic Techniques
  year: 1984
  ident: 1
  article-title: Identity-based cryptosystems and signature schemes
– ident: 5
  doi: 10.1109/tifs.2014.2327758
– start-page: 98
  volume-title: Annual Cryptology Conference
  year: 2010
  ident: 35
  article-title: Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical ibe
– volume-title: Advances in Crytology, Crypto
  year: 2001
  ident: 2
  article-title: Identity-based encryption from the weil pairing
  doi: 10.1007/3-540-44647-8_13
– volume: 10
  start-page: 25
  year: 2015
  ident: 12
  article-title: Adaptive secure revocable identity-based signature scheme over lattices
  publication-title: Computer Engineering
– ident: 6
  doi: 10.1002/sec.696
– ident: 13
  doi: 10.1016/j.ins.2020.01.008
– ident: 30
  doi: 10.1504/ijesdf.2013.054403
– start-page: 363
  ident: 7
  article-title: Revocable identity-based signature without pairing
– start-page: 179
  ident: 23
  article-title: Id-based forward-secure signature scheme from the bilinear pairings
– start-page: 182
  volume-title: International Workshop on Post-Quantum Cryptography
  year: 2010
  ident: 28
  article-title: Strongly unforgeable signatures and hierarchical identity-based signatures from lattices without random oracles
  doi: 10.1007/978-3-642-12929-2_14
– ident: 14
  doi: 10.1155/2020/1743421
– volume: 18
  start-page: 2301
  issue: 5
  year: 2021
  ident: 27
  article-title: RS-HABE: revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud
  publication-title: IEEE Transactions on Dependable and Secure Computing
– ident: 9
  doi: 10.1002/sec.1513
– ident: 11
  doi: 10.1007/s12652-017-0631-0
– ident: 18
  doi: 10.1016/j.compeleceng.2013.12.003
– ident: 22
  doi: 10.1016/j.compeleceng.2011.03.011
– ident: 31
  doi: 10.1631/fitee.1900318
– start-page: 405
  volume-title: Public-Key Cryptography-PKC 2019-22nd IACR International Conference On Practice And Theory Of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, Volume 11442 of Lecture Notes In Computer Science
  year: 2019
  ident: 3
  article-title: Identity-based broadcast encryption with efficient revocation
– start-page: 431
  volume-title: Annual International Cryptology Conference
  year: 1999
  ident: 20
  article-title: A forward-secure digital signature scheme
– ident: 29
  doi: 10.1002/sec.531
– ident: 34
  doi: 10.1155/2017/7571201
SSID ssj0061474
Score 2.2560976
Snippet Forward-secure revocation is a powerful cryptographic technique to alleviate key exposure attacks on identity-based cryptosystems. In recent years, quantum...
SourceID unpaywall
proquest
crossref
hindawi
SourceType Open Access Repository
Aggregation Database
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Computer systems
Construction
Cryptography
Digital signatures
Efficiency
Quantum computers
Quantum computing
SummonAdditionalLinks – databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED90Q9QHv8XplDyob51dk3QdPqk4VFREHSgIJZ86Hd1wVdG_3qRN1fmg4ltLQ5reHbnfpXe_A1iXjFneN-4J3Aw9EnDssTAwtmzhq4-xZBkdw8lpeNAmR1f0agS2i1oYaSnie0wOanc2Jn3pZLu1k-tgayASG64HWw3SJISaoFDqUSiH1ADxEpTbp2c71_l_ZJsFVCef10FQpL1TOjTFkEMac28dwpvjT0mfvb6wbveL62lNw02x6Dzj5KH2lPKaePvG5_jPr5qBKQdJ0U5uQ7MwopI5mPxCVDgP9xk7dUcg29-zYJxFPY1avccs7TY7tlfoXD0b38i7CrkC4Fdv17hJiS46tzmFKGKJRMcstTl37tlhhlDT3EYGC9Bu7V_uHXiuS4MngiZJPUy5VFhHVGBfGDwXyZBr23NTRb7tsxgRRRXmxluyusZMca6J2dV0xJRocCzwIpSSXqKWAAmhRcQojxpRSJjCzMSOWJtlK-HzBpMV2ChUFfdzMo44C2Ioja38Yie_Cqw7Of8yrFooOS50EZso3cfUsvJXYPND8T_Os_zXgSswYW9tKWM9rELJ6EutGkyT8jVnu-_1QvKC
  priority: 102
  providerName: Unpaywall
Title Generic Construction of Forward-Secure Revocable Identity-Based Signature and Lattice-Based Instantiations
URI https://dx.doi.org/10.1155/2022/7494452
https://www.proquest.com/docview/2740356858
https://downloads.hindawi.com/journals/scn/2022/7494452.pdf
UnpaywallVersion publishedVersion
Volume 2022
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  issn: 1939-0122
  databaseCode: ADMLS
  dateStart: 20110501
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVWIB
  databaseName: Wiley Online Library - Core collection (SURFmarket)
  issn: 1939-0122
  databaseCode: DR2
  dateStart: 20070101
  customDbUrl:
  isFulltext: true
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  providerName: Wiley-Blackwell
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0061474
  issn: 1939-0122
  databaseCode: 24P
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwEA46EfVB_InTOfIwfSt2TdJmj1McU3TIdDCfSpImOhndcNOx_95Lm4pTUB9Lf3KX3vddcvkOoVoihNV9k54ijdCjgSSeCAMYy5a--oQkIpNjuO2E7R697rO-E0ma_FzCB7Sz6XlwFtEGpQxi7TIPbeVWt90vAi4ATOQWj23pT50W9e3f7l1AntVnm_LOBgvEcu0tHYv5TAyHXzCmtYU2HTnEzdyb22hJpzto44tk4C56yXSiBwrbTpuF9iseGdwavWYFsNkEusZd_Q4oJYcau624c-8cACvB94OnXMwTizTBN2Jqq9_cuauMK05zb032UK91-XDR9ly_BE8FDTr1CJOJJoYzRXwFzIonoTS2-6Xmvu14yKlmmkjALVE3RGgpDYX4YrjQKpJEkX1USkepPkBYKaO4YJJHPKRCEwFZHDHw2Vr5MhJJGZ0UtozHuSxGnKUTjMXW5rGzeRnVnKH_uKxSeCF2_9AkhnzZJ8zq45fR6adnfn3O4f9ed4TW7aHdUlgPK6gE3tLHwC2msgqsuhtUs_FVRSu9zl3z8QNbFskN
linkProvider Hindawi Publishing
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED90Q9QHv8XplDyob51dk3QdPqk4VFREHSgIJZ86Hd1wVdG_3qRN1fmg4ltLQ5reHbnfpXe_A1iXjFneN-4J3Aw9EnDssTAwtmzhq4-xZBkdw8lpeNAmR1f0agS2i1oYaSnie0wOanc2Jn3pZLu1k-tgayASG64HWw3SJISaoFDqUSiH1ADxEpTbp2c71_l_ZJsFVCef10FQpL1TOjTFkEMac28dwpvjT0mfvb6wbveL62lNw02x6Dzj5KH2lPKaePvG5_jPr5qBKQdJ0U5uQ7MwopI5mPxCVDgP9xk7dUcg29-zYJxFPY1avccs7TY7tlfoXD0b38i7CrkC4Fdv17hJiS46tzmFKGKJRMcstTl37tlhhlDT3EYGC9Bu7V_uHXiuS4MngiZJPUy5VFhHVGBfGDwXyZBr23NTRb7tsxgRRRXmxluyusZMca6J2dV0xJRocCzwIpSSXqKWAAmhRcQojxpRSJjCzMSOWJtlK-HzBpMV2ChUFfdzMo44C2Ioja38Yie_Cqw7Of8yrFooOS50EZso3cfUsvJXYPND8T_Os_zXgSswYW9tKWM9rELJ6EutGkyT8jVnu-_1QvKC
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Generic+Construction+of+Forward-Secure+Revocable+Identity-Based+Signature+and+Lattice-Based+Instantiations&rft.jtitle=Security+and+communication+networks&rft.au=He%2C+Yan&rft.au=Qin%2C+Baodong&rft.au=Gao%2C+Wen&rft.au=Zheng%2C+Dong&rft.date=2022-11-16&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F7494452&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon