4.3 Article

Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme

Journal

IET INFORMATION SECURITY
Volume 14, Issue 4, Pages 443-451

Publisher

INST ENGINEERING TECHNOLOGY-IET
DOI: 10.1049/iet-ifs.2019.0559

Keywords

public key cryptography; telecommunication security; cryptography; cryptographic protocols; protocols; electronic commerce; digital signatures; globalisation; message authentication; distributed signing protocol; IEEE P1363-compliant identity-based signature scheme; economic globalisation; electronic commerce applications; ID-based; multiparty setting; private information; secret information; distributed applications; global manufacturer; distributed identity-based; global electronic commerce system; authors; decentralised manner; fair manner; decisional Diffie-Hellman assumptions; waiting delay; seven parties; time 311; 86 ms; time 558; 2 ms; time 707; 21 ms

Funding

  1. National Natural Science Foundation of China [61972294, 61932016, 61802180]
  2. Science and Technology planning project of ShenZhen [JCYJ20170818112550194]
  3. Natural Science Foundation of Jiangsu Province [BK20180421]
  4. National Cryptography Development Fund [MMJJ20180105]
  5. Fundamental Research Funds for the Central Universities [NE2018106]

Ask authors/readers for more resources

The identity-based signature (IBS) scheme is one of the most promising secure and widely used cryptographic primitives for electronic commerce applications. For example, ID-based signing in a multi-party setting,without ever revealing any private and secret information, has received considerable interest in distributed applications such as a global manufacturer. However, there is no practical solution for such a group setting (e.g. more than two parties). Therefore, in this study, the authors present the first distributed identity-based signing protocol for the global electronic commerce system. Specifically, the authors' designed protocol allows a group of parties to generate the signature in a decentralised and fair manner. They also prove that their proposed protocol is secure against a malicious adversary under the discrete logarithm and decisional Diffie-Hellman assumptions. Moreover, they implement the protocol using the MIRACL libraries on physical computing devices. Findings from the evaluations demonstrate the practical utility of their proposed protocol, in terms of achieving high level of security within a reasonable time framework (e.g. signing time (including communication latency and waiting delay) takes 311.86 ms for three parties, 558.2 ms for five parties, and 707.21 ms for seven parties, under a single-thread implementation).

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available