z-logo
open-access-imgOpen Access
Efficient Identity-based Signature Scheme with Message Recovery
Author(s) -
Salome James,
P. Jayarama Reddy
Publication year - 2019
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1344/1/012016
Subject(s) - computer science , digital signature , schnorr signature , elgamal signature scheme , blind signature , merkle signature scheme , signature (topology) , public key cryptography , cryptography , theoretical computer science , elliptic curve digital signature algorithm , scheme (mathematics) , distributed computing , computer network , algorithm , computer security , mathematics , elliptic curve cryptography , encryption , hash function , mathematical analysis , geometry
Digital signature is one of the important primitive of public-key cryptography and has become an essential technique in providing security services in modern communications. Due to the limitations imposed by both the communication bandwidth and computational power of wireless communication devices, signature schemes with less bandwidth and less computational cost are desirable for practical applications. Signature schemes with message recovery provide a feature that the message is recoverable from the signature and hence does not need to be transmitted separately for signature verification. Recently many signature schemes with message recovery have been designed in traditional as well as Identity based settings and most of the schemes are constructed using bilinear pairings over elliptic curves. Nevertheless, the computational cost of a pairing is more expensive and is higher than the scalar multiplication. Thus, signature schemes without pairing would be more appealing in terms of efficiency. In this paper, we propose an efficient identity-based message recovery scheme without pairings. In our scheme the message itself is not required to be transmitted together with the signature and so it turns out to have the least data size of communication cost. Also, we compare our scheme with the existing ID-based signature schemes with message recovery in terms of computational and communicational point of view. With the pairing-free realization, the proposed scheme is efficient and applicable for resource constrained devices.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here