Skip to main content
Top
Published in: Soft Computing 3/2019

09-03-2018 | Foundations

An efficient online/offline ID-based short signature procedure using extended chaotic maps

Authors: Chandrashekhar Meshram, Chun-Ta Li, Sarita Gajbhiye Meshram

Published in: Soft Computing | Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Chaos has been dealt with a decent approach to reduce computational complexity while fulfilling security necessities of a cryptographic techniques. In this article, we purpose an efficient online/offline ID-based short signature procedure based on extended chaotic maps and also demonstrated that it is protected under unforgeability of ID-based short signature under chosen message attack. Some of the intriguing arrangements of presented procedures is that it gives multi-time use of the offline stockpiling, which permits the signer to reuse the offline pre-administered information in polynomial time, rather than one-time use in all past online/offline signature procedures.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Bellare M, Namprempre C, Neven G (2009) Security proofs for identity based identification and signature schemes. J Cryptol 22:1–61MathSciNetCrossRefMATH Bellare M, Namprempre C, Neven G (2009) Security proofs for identity based identification and signature schemes. J Cryptol 22:1–61MathSciNetCrossRefMATH
go back to reference Cha J, Cheon J (2003) An identity-based signature from gap Diffie Hellman groups. In: Proceedings of PKC’2003. Lecture notes in computer science. Springer, Berlin, vol 2567, pp 18–30 Cha J, Cheon J (2003) An identity-based signature from gap Diffie Hellman groups. In: Proceedings of PKC’2003. Lecture notes in computer science. Springer, Berlin, vol 2567, pp 18–30
go back to reference Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761MathSciNetCrossRefMATH Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761MathSciNetCrossRefMATH
go back to reference Chen G, Chen Y, Liao X (2007a) An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fractals 31(3):571–579MathSciNetCrossRefMATH Chen G, Chen Y, Liao X (2007a) An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fractals 31(3):571–579MathSciNetCrossRefMATH
go back to reference Chen X, Zhang F, Susilo W, Mu Y (2007b) Efficient generic online/offline signatures without key exposure. In: Proceedings of ACNS ’07. Lecture notes in computer science. Springer, Berlin, vol 4521, pp 18–30 Chen X, Zhang F, Susilo W, Mu Y (2007b) Efficient generic online/offline signatures without key exposure. In: Proceedings of ACNS ’07. Lecture notes in computer science. Springer, Berlin, vol 4521, pp 18–30
go back to reference Deng S, Li Y, Xiao D (2010) Analysis and improvement of a chaos-based Hash function construction. Commun Nonlinear Sci Numer Simul 15(5):1338–1347MathSciNetCrossRefMATH Deng S, Li Y, Xiao D (2010) Analysis and improvement of a chaos-based Hash function construction. Commun Nonlinear Sci Numer Simul 15(5):1338–1347MathSciNetCrossRefMATH
go back to reference Even S, Goldreich O, Micali S (1989) On-line/off-line digital signatures. In: Proceedings of CRYPTO ’89. Lecture notes in computer science. Springer, New York, vol 2442, pp 263-277 Even S, Goldreich O, Micali S (1989) On-line/off-line digital signatures. In: Proceedings of CRYPTO ’89. Lecture notes in computer science. Springer, New York, vol 2442, pp 263-277
go back to reference Galindo D, Garcia F (2009) A schnorr-like lightweight identity-based signature scheme. In: Progress in cryptology-AFRICACRYPT 2009. Lecture notes in computer science. Springer, Berlin, vol 5580, pp 135–148 Galindo D, Garcia F (2009) A schnorr-like lightweight identity-based signature scheme. In: Progress in cryptology-AFRICACRYPT 2009. Lecture notes in computer science. Springer, Berlin, vol 5580, pp 135–148
go back to reference Gao Y, Zeng P, Raymond Choo KK, Song F (2016) An improved online/offline identity-based signature scheme for WSNs. Int J Netw Secur 18(6):1143–1151 Gao Y, Zeng P, Raymond Choo KK, Song F (2016) An improved online/offline identity-based signature scheme for WSNs. Int J Netw Secur 18(6):1143–1151
go back to reference Guillou LC, Quisquater JJ (1989) A “Paradoxical” identity-based signature scheme resulting from zero-knowledge. In: Proceedings of CRYPTO 88. Lecture notes in computer science. Springer, Berlin, vol 403, pp 216–231 Guillou LC, Quisquater JJ (1989) A “Paradoxical” identity-based signature scheme resulting from zero-knowledge. In: Proceedings of CRYPTO 88. Lecture notes in computer science. Springer, Berlin, vol 403, pp 216–231
go back to reference Herranz J (2005) Deterministic identity-based signatures for partial aggregation. Comput J 49(3):322–330CrossRef Herranz J (2005) Deterministic identity-based signatures for partial aggregation. Comput J 49(3):322–330CrossRef
go back to reference Hess F (2003) Efficient identity based signature schemes based on pairings. In: Selected area in cryptography, SAC2002. Lecture notes in computer science. Springer, Berlin, vol 2595, pp 310–324 Hess F (2003) Efficient identity based signature schemes based on pairings. In: Selected area in cryptography, SAC2002. Lecture notes in computer science. Springer, Berlin, vol 2595, pp 310–324
go back to reference Joye M (2008) An efficient on-line/off-line signature scheme without random oracles. In: Proceedings of CANS ’08. Lecture notes in computer science. Springer, Berlin, vol 5339, pp 98–107 Joye M (2008) An efficient on-line/off-line signature scheme without random oracles. In: Proceedings of CANS ’08. Lecture notes in computer science. Springer, Berlin, vol 5339, pp 98–107
go back to reference Kang B, Boyd C, Dawson E (2009) A novel identity-based strong designated verifier signature scheme. J Syst Softw 82:270–273CrossRef Kang B, Boyd C, Dawson E (2009) A novel identity-based strong designated verifier signature scheme. J Syst Softw 82:270–273CrossRef
go back to reference Kar J (2014) Provably secure online/off-line identity-based signature scheme for wireless sensor network. Int J Netw Secur 16(1):29–39 Kar J (2014) Provably secure online/off-line identity-based signature scheme for wireless sensor network. Int J Netw Secur 16(1):29–39
go back to reference Kurosawa K, Schmidt-Samoa K (2006) New online/offline signature schemes without random oracles. In: Proceedings of PKC ’06. Lecture notes in computer science. Springer, Berlin, vol 3958, pp 330–346 Kurosawa K, Schmidt-Samoa K (2006) New online/offline signature schemes without random oracles. In: Proceedings of PKC ’06. Lecture notes in computer science. Springer, Berlin, vol 3958, pp 330–346
go back to reference Lai YM, Cheng PJ, Lee CC, Ku CY (2016) A new ticket-based authentication mechanism for fast handover in mesh network. PLoS ONE 11(5):e0155064CrossRef Lai YM, Cheng PJ, Lee CC, Ku CY (2016) A new ticket-based authentication mechanism for fast handover in mesh network. PLoS ONE 11(5):e0155064CrossRef
go back to reference Lee CC, Hsu CW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1–2):201–211MathSciNetCrossRef Lee CC, Hsu CW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1–2):201–211MathSciNetCrossRef
go back to reference Lee CC, Chen CL, Wu CY, Huang SY (2012) An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn 69(1–2):79–87MathSciNetCrossRefMATH Lee CC, Chen CL, Wu CY, Huang SY (2012) An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn 69(1–2):79–87MathSciNetCrossRefMATH
go back to reference Lee CC, Hsu CW, Lai YM, Vasilakos AV (2013) An enhanced mobile-healthcare emergency system based on extended chaotic maps. J Med Syst 37(5):9973CrossRef Lee CC, Hsu CW, Lai YM, Vasilakos AV (2013) An enhanced mobile-healthcare emergency system based on extended chaotic maps. J Med Syst 37(5):9973CrossRef
go back to reference Lee CC, Li CT, Hsu CW (2013) A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn 73(1–2):125–132MathSciNetCrossRefMATH Lee CC, Li CT, Hsu CW (2013) A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn 73(1–2):125–132MathSciNetCrossRefMATH
go back to reference Lee CC, Li CT, Chiu ST, Lai YM (2014) A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn 79(4):2485–2495MathSciNetCrossRefMATH Lee CC, Li CT, Chiu ST, Lai YM (2014) A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn 79(4):2485–2495MathSciNetCrossRefMATH
go back to reference Lee CC, Lou DC, Li CT, Hsu CW (2014) An extended chaotic-maps-based protocol with key agreement for multiserver environments. Nonlinear Dyn 76(1):853–866MathSciNetCrossRefMATH Lee CC, Lou DC, Li CT, Hsu CW (2014) An extended chaotic-maps-based protocol with key agreement for multiserver environments. Nonlinear Dyn 76(1):853–866MathSciNetCrossRefMATH
go back to reference Li F, Shirase M, Takagi T (2008) On the security of online/offline signatures and multisignatures from acisp’06. In: Proceedings of CANS ’08. Lecture notes in computer science. Springer, Berlin, vol 5339, pp 108–119 Li F, Shirase M, Takagi T (2008) On the security of online/offline signatures and multisignatures from acisp’06. In: Proceedings of CANS ’08. Lecture notes in computer science. Springer, Berlin, vol 5339, pp 108–119
go back to reference Li CT, Lee CC, Weng CY (2014) A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J Med Syst 38(9):77CrossRef Li CT, Lee CC, Weng CY (2014) A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J Med Syst 38(9):77CrossRef
go back to reference Li CT, Lee CC, Weng CY, Chen SJ (2016) A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J Med Syst 40(11):233CrossRef Li CT, Lee CC, Weng CY, Chen SJ (2016) A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J Med Syst 40(11):233CrossRef
go back to reference Mason JC, Handscomb DC (2003) Chebyshev polynomials. Chapman and Hall/CRC, Boca RatonMATH Mason JC, Handscomb DC (2003) Chebyshev polynomials. Chapman and Hall/CRC, Boca RatonMATH
go back to reference Meshram C (2015) An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem. Inf Process Lett 115(2):351–358MathSciNetCrossRefMATH Meshram C (2015) An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem. Inf Process Lett 115(2):351–358MathSciNetCrossRefMATH
go back to reference Meshram C (2015) An efficient ID-based beta cryptosystem. Int J Secur Appl 9(2):189–202MathSciNet Meshram C (2015) An efficient ID-based beta cryptosystem. Int J Secur Appl 9(2):189–202MathSciNet
go back to reference Meshram C, Li X (2017) New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group. J Inf Optim Sci 10(1080/02522667):1411013 Meshram C, Li X (2017) New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group. J Inf Optim Sci 10(1080/02522667):1411013
go back to reference Meshram C, Meshram S (2013) An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem. Inf Process Lett 113(10–11):375–380MathSciNetCrossRefMATH Meshram C, Meshram S (2013) An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem. Inf Process Lett 113(10–11):375–380MathSciNetCrossRefMATH
go back to reference Meshram C, Meshram SA (2017) Constructing new An ID-based cryptosystem for IFP and GDLP based cryptosystem. J Discrete Math Sci Cryptogr 20(5):1121–1134MathSciNetCrossRef Meshram C, Meshram SA (2017) Constructing new An ID-based cryptosystem for IFP and GDLP based cryptosystem. J Discrete Math Sci Cryptogr 20(5):1121–1134MathSciNetCrossRef
go back to reference Meshram C, Obaidat MS (2015) An ID-based quadratic-exponentiation randomized cryptographic scheme. In: IEEE proceeding of international conference on computer, information and telecommunication systems, pp 1–5 Meshram C, Obaidat MS (2015) An ID-based quadratic-exponentiation randomized cryptographic scheme. In: IEEE proceeding of international conference on computer, information and telecommunication systems, pp 1–5
go back to reference Meshram C, Powar PL (2016) An efficient identity-based QER cryptographic scheme. Complex Intell Syst 2(4):285–291CrossRef Meshram C, Powar PL (2016) An efficient identity-based QER cryptographic scheme. Complex Intell Syst 2(4):285–291CrossRef
go back to reference Meshram C, Meshram S, Zhang M (2012) An ID-based cryptographic mechanisms based on GDLP and IFP. Inf Process Lett 112(19):753–758MathSciNetCrossRefMATH Meshram C, Meshram S, Zhang M (2012) An ID-based cryptographic mechanisms based on GDLP and IFP. Inf Process Lett 112(19):753–758MathSciNetCrossRefMATH
go back to reference Meshram C, Powar PL, Obaidat MS, Lee CC (2016a) An IBE technique using partial discrete logarithm. Proc Comput Sci 93:735–741CrossRef Meshram C, Powar PL, Obaidat MS, Lee CC (2016a) An IBE technique using partial discrete logarithm. Proc Comput Sci 93:735–741CrossRef
go back to reference Meshram C, Powar PL, Obaidat MS (2016b) An UF-IBSS-CMA protected online/offline identity-based short signature technique using PDL. Proc Comput Sci 93:847–853CrossRef Meshram C, Powar PL, Obaidat MS (2016b) An UF-IBSS-CMA protected online/offline identity-based short signature technique using PDL. Proc Comput Sci 93:847–853CrossRef
go back to reference Meshram C, Lee CC, Li CT, Chen CL (2017a) A secure key authentication scheme for cryptosystems based on GDLP and IFP. Soft Comput 21(24):7285–7291CrossRef Meshram C, Lee CC, Li CT, Chen CL (2017a) A secure key authentication scheme for cryptosystems based on GDLP and IFP. Soft Comput 21(24):7285–7291CrossRef
go back to reference Meshram C, Tseng YM, Lee CC, Meshram SG (2017b) An IND-ID-CPA secure ID-based cryptographic protocol using GDLP and IFP. Informatica 28(3):471–484MathSciNetCrossRefMATH Meshram C, Tseng YM, Lee CC, Meshram SG (2017b) An IND-ID-CPA secure ID-based cryptographic protocol using GDLP and IFP. Informatica 28(3):471–484MathSciNetCrossRefMATH
go back to reference Selvi SD, Sree V, Rangan CP (2011) Identity-based deterministic signature scheme without forking-lemma. Adv Inf Comput Secur 7038:79–95 Lecture Notes in Computer ScienceMATH Selvi SD, Sree V, Rangan CP (2011) Identity-based deterministic signature scheme without forking-lemma. Adv Inf Comput Secur 7038:79–95 Lecture Notes in Computer ScienceMATH
go back to reference Shamir A, Tauman Y (2001) Improved online/offline signature schemes. In: Proceedings of CRYPTO ’01. Lecture notes in computer science. Springer, Berlin, vol 2139, pp 355–367 Shamir A, Tauman Y (2001) Improved online/offline signature schemes. In: Proceedings of CRYPTO ’01. Lecture notes in computer science. Springer, Berlin, vol 2139, pp 355–367
go back to reference Wang Y, Wong K, Liao X, Xiang T (2009) A block cipher with dynamic S-boxes based on tent map. Commun Nonlinear Sci Numer Simul 14(7):3089–3099MathSciNetCrossRefMATH Wang Y, Wong K, Liao X, Xiang T (2009) A block cipher with dynamic S-boxes based on tent map. Commun Nonlinear Sci Numer Simul 14(7):3089–3099MathSciNetCrossRefMATH
go back to reference Wang X, Yang L, Liu R (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62:615–621CrossRefMATH Wang X, Yang L, Liu R (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62:615–621CrossRefMATH
go back to reference Wang X, Wang X, Zhao J (2011) Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn 63:587–597MathSciNetCrossRef Wang X, Wang X, Zhao J (2011) Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn 63:587–597MathSciNetCrossRef
go back to reference Xiao D, Shih F, Liao X (2010) A chaos-based hash function with both modification detection and localization capabilities. Commun Nonlinear Sci Numer Simul 15(9):2254–2261MathSciNetCrossRefMATH Xiao D, Shih F, Liao X (2010) A chaos-based hash function with both modification detection and localization capabilities. Commun Nonlinear Sci Numer Simul 15(9):2254–2261MathSciNetCrossRefMATH
go back to reference Xu S, Mu Y, Susilo W (2006) Online/offline signatures and multisignatures for AVOD and DSR routing security. In: Proceedings of ACISP ’06. Lecture notes in computer science. Springer, Berlin, vol 4058, pp 99–110 Xu S, Mu Y, Susilo W (2006) Online/offline signatures and multisignatures for AVOD and DSR routing security. In: Proceedings of ACISP ’06. Lecture notes in computer science. Springer, Berlin, vol 4058, pp 99–110
Metadata
Title
An efficient online/offline ID-based short signature procedure using extended chaotic maps
Authors
Chandrashekhar Meshram
Chun-Ta Li
Sarita Gajbhiye Meshram
Publication date
09-03-2018
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 3/2019
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-018-3112-2

Other articles of this Issue 3/2019

Soft Computing 3/2019 Go to the issue

Methodologies and Application

Collaborative multi-view K-means clustering

Premium Partner