Proceedings of the 2nd Annual International Conference on Electronics, Electrical Engineering and Information Science (EEEIS 2016)

Identity-based signature scheme based on quintic residues

Authors
Xue-Dong Dong, Yuan Gao
Corresponding Author
Xue-Dong Dong
Available Online December 2016.
DOI
10.2991/eeeis-16.2017.103How to use a DOI?
Keywords
Cryptography; Quintic residue; Identity-based signature; Provable security.
Abstract

We propose a new method to compute a quintic root of a quintic residue. Then we give a new identity-based signature scheme by the method. The scheme is secure against existential forgery on the adaptive chosen message and identity attacks assuming the hardness of factoring. The scheme is the first identity-based signature scheme based on quintic residues.

Copyright
© 2017, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd Annual International Conference on Electronics, Electrical Engineering and Information Science (EEEIS 2016)
Series
Advances in Engineering Research
Publication Date
December 2016
ISBN
10.2991/eeeis-16.2017.103
ISSN
2352-5401
DOI
10.2991/eeeis-16.2017.103How to use a DOI?
Copyright
© 2017, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Xue-Dong Dong
AU  - Yuan Gao
PY  - 2016/12
DA  - 2016/12
TI  - Identity-based signature scheme based on quintic residues
BT  - Proceedings of the 2nd Annual International Conference on Electronics, Electrical Engineering and Information Science (EEEIS 2016)
PB  - Atlantis Press
SP  - 836
EP  - 841
SN  - 2352-5401
UR  - https://doi.org/10.2991/eeeis-16.2017.103
DO  - 10.2991/eeeis-16.2017.103
ID  - Dong2016/12
ER  -