Skip to main content
Log in

An efficient online/offline ID-based short signature procedure using extended chaotic maps

  • Foundations
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Chaos has been dealt with a decent approach to reduce computational complexity while fulfilling security necessities of a cryptographic techniques. In this article, we purpose an efficient online/offline ID-based short signature procedure based on extended chaotic maps and also demonstrated that it is protected under unforgeability of ID-based short signature under chosen message attack. Some of the intriguing arrangements of presented procedures is that it gives multi-time use of the offline stockpiling, which permits the signer to reuse the offline pre-administered information in polynomial time, rather than one-time use in all past online/offline signature procedures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Bellare M, Namprempre C, Neven G (2009) Security proofs for identity based identification and signature schemes. J Cryptol 22:1–61

    Article  MathSciNet  MATH  Google Scholar 

  • Boneh D, Boyen X (2008) Short signatures without random oracles the SDH assumption in bilinear groups. J Cryptol 2:149–177

    Article  MathSciNet  MATH  Google Scholar 

  • Cha J, Cheon J (2003) An identity-based signature from gap Diffie Hellman groups. In: Proceedings of PKC’2003. Lecture notes in computer science. Springer, Berlin, vol 2567, pp 18–30

  • Chain K, Kuo WC (2013) A new digital signature scheme based on chaotic maps. Nonlinear Dyn 74:1003–1012

    Article  MathSciNet  MATH  Google Scholar 

  • Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  • Chen G, Chen Y, Liao X (2007a) An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fractals 31(3):571–579

    Article  MathSciNet  MATH  Google Scholar 

  • Chen X, Zhang F, Susilo W, Mu Y (2007b) Efficient generic online/offline signatures without key exposure. In: Proceedings of ACNS ’07. Lecture notes in computer science. Springer, Berlin, vol 4521, pp 18–30

  • Dachselt F, Schwarz W (2001) Chaos and cryptography. IEEE Trans Circuits Syst I Fundam Theory Appl 48(12):1498–1509

    Article  MathSciNet  MATH  Google Scholar 

  • Deng S, Li Y, Xiao D (2010) Analysis and improvement of a chaos-based Hash function construction. Commun Nonlinear Sci Numer Simul 15(5):1338–1347

    Article  MathSciNet  MATH  Google Scholar 

  • Even S, Goldreich O, Micali S (1989) On-line/off-line digital signatures. In: Proceedings of CRYPTO ’89. Lecture notes in computer science. Springer, New York, vol 2442, pp 263-277

  • Galindo D, Garcia F (2009) A schnorr-like lightweight identity-based signature scheme. In: Progress in cryptology-AFRICACRYPT 2009. Lecture notes in computer science. Springer, Berlin, vol 5580, pp 135–148

  • Gao Y, Zeng P, Raymond Choo KK, Song F (2016) An improved online/offline identity-based signature scheme for WSNs. Int J Netw Secur 18(6):1143–1151

    Google Scholar 

  • Guillou LC, Quisquater JJ (1989) A “Paradoxical” identity-based signature scheme resulting from zero-knowledge. In: Proceedings of CRYPTO 88. Lecture notes in computer science. Springer, Berlin, vol 403, pp 216–231

  • Han S, Chang E (2009) Chaotic map based key agreement without clock synchronization. Choas Soliton Fractals 39(3):1283–1289

    Article  MathSciNet  MATH  Google Scholar 

  • Herranz J (2005) Deterministic identity-based signatures for partial aggregation. Comput J 49(3):322–330

    Article  Google Scholar 

  • Hess F (2003) Efficient identity based signature schemes based on pairings. In: Selected area in cryptography, SAC2002. Lecture notes in computer science. Springer, Berlin, vol 2595, pp 310–324

  • Joye M (2008) An efficient on-line/off-line signature scheme without random oracles. In: Proceedings of CANS ’08. Lecture notes in computer science. Springer, Berlin, vol 5339, pp 98–107

  • Jye S (2011) A speech encryption using fractional chaotic systems. Nonlinear Dyn 65:103–108

    Article  MathSciNet  MATH  Google Scholar 

  • Kang B, Boyd C, Dawson E (2009) A novel identity-based strong designated verifier signature scheme. J Syst Softw 82:270–273

    Article  Google Scholar 

  • Kar J (2014) Provably secure online/off-line identity-based signature scheme for wireless sensor network. Int J Netw Secur 16(1):29–39

    Google Scholar 

  • Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1(3):6–21

    Article  MathSciNet  Google Scholar 

  • Kurosawa K, Schmidt-Samoa K (2006) New online/offline signature schemes without random oracles. In: Proceedings of PKC ’06. Lecture notes in computer science. Springer, Berlin, vol 3958, pp 330–346

  • Lai YM, Cheng PJ, Lee CC, Ku CY (2016) A new ticket-based authentication mechanism for fast handover in mesh network. PLoS ONE 11(5):e0155064

    Article  Google Scholar 

  • Lee CC, Hsu CW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1–2):201–211

    Article  MathSciNet  Google Scholar 

  • Lee CC, Chen CL, Wu CY, Huang SY (2012) An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn 69(1–2):79–87

    Article  MathSciNet  MATH  Google Scholar 

  • Lee CC, Hsu CW, Lai YM, Vasilakos AV (2013) An enhanced mobile-healthcare emergency system based on extended chaotic maps. J Med Syst 37(5):9973

    Article  Google Scholar 

  • Lee CC, Li CT, Hsu CW (2013) A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn 73(1–2):125–132

    Article  MathSciNet  MATH  Google Scholar 

  • Lee CC, Li CT, Chiu ST, Lai YM (2014) A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn 79(4):2485–2495

    Article  MathSciNet  MATH  Google Scholar 

  • Lee CC, Lou DC, Li CT, Hsu CW (2014) An extended chaotic-maps-based protocol with key agreement for multiserver environments. Nonlinear Dyn 76(1):853–866

    Article  MathSciNet  MATH  Google Scholar 

  • Li F, Shirase M, Takagi T (2008) On the security of online/offline signatures and multisignatures from acisp’06. In: Proceedings of CANS ’08. Lecture notes in computer science. Springer, Berlin, vol 5339, pp 108–119

  • Li CT, Lee CC, Weng CY (2014) A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J Med Syst 38(9):77

    Article  Google Scholar 

  • Li CT, Lee CC, Weng CY, Chen SJ (2016) A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J Med Syst 40(11):233

    Article  Google Scholar 

  • Mason JC, Handscomb DC (2003) Chebyshev polynomials. Chapman and Hall/CRC, Boca Raton

    MATH  Google Scholar 

  • Meshram C (2015) An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem. Inf Process Lett 115(2):351–358

    Article  MathSciNet  MATH  Google Scholar 

  • Meshram C (2015) An efficient ID-based beta cryptosystem. Int J Secur Appl 9(2):189–202

    MathSciNet  Google Scholar 

  • Meshram C, Li X (2017) New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group. J Inf Optim Sci 10(1080/02522667):1411013

    Google Scholar 

  • Meshram C, Meshram S (2013) An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem. Inf Process Lett 113(10–11):375–380

    Article  MathSciNet  MATH  Google Scholar 

  • Meshram C, Meshram SA (2017) Constructing new An ID-based cryptosystem for IFP and GDLP based cryptosystem. J Discrete Math Sci Cryptogr 20(5):1121–1134

    Article  MathSciNet  Google Scholar 

  • Meshram C, Obaidat MS (2015) An ID-based quadratic-exponentiation randomized cryptographic scheme. In: IEEE proceeding of international conference on computer, information and telecommunication systems, pp 1–5

  • Meshram C, Powar PL (2016) An efficient identity-based QER cryptographic scheme. Complex Intell Syst 2(4):285–291

    Article  Google Scholar 

  • Meshram C, Meshram S, Zhang M (2012) An ID-based cryptographic mechanisms based on GDLP and IFP. Inf Process Lett 112(19):753–758

    Article  MathSciNet  MATH  Google Scholar 

  • Meshram C, Powar PL, Obaidat MS, Lee CC (2016a) An IBE technique using partial discrete logarithm. Proc Comput Sci 93:735–741

    Article  Google Scholar 

  • Meshram C, Powar PL, Obaidat MS (2016b) An UF-IBSS-CMA protected online/offline identity-based short signature technique using PDL. Proc Comput Sci 93:847–853

    Article  Google Scholar 

  • Meshram C, Lee CC, Li CT, Chen CL (2017a) A secure key authentication scheme for cryptosystems based on GDLP and IFP. Soft Comput 21(24):7285–7291

    Article  Google Scholar 

  • Meshram C, Tseng YM, Lee CC, Meshram SG (2017b) An IND-ID-CPA secure ID-based cryptographic protocol using GDLP and IFP. Informatica 28(3):471–484

    Article  MathSciNet  MATH  Google Scholar 

  • Meshram C, Obaidat MS, Meshram SG (2017c) Chebyshev chaotic maps based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography. Secur Priv. https://doi.org/10.1002/spy2.12

  • Selvi SD, Sree V, Rangan CP (2011) Identity-based deterministic signature scheme without forking-lemma. Adv Inf Comput Secur 7038:79–95 Lecture Notes in Computer Science

    MATH  Google Scholar 

  • Shamir A, Tauman Y (2001) Improved online/offline signature schemes. In: Proceedings of CRYPTO ’01. Lecture notes in computer science. Springer, Berlin, vol 2139, pp 355–367

  • Wang Y, Wong K, Liao X, Xiang T (2009) A block cipher with dynamic S-boxes based on tent map. Commun Nonlinear Sci Numer Simul 14(7):3089–3099

    Article  MathSciNet  MATH  Google Scholar 

  • Wang X, Yang L, Liu R (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62:615–621

    Article  MATH  Google Scholar 

  • Wang X, Wang X, Zhao J (2011) Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn 63:587–597

    Article  MathSciNet  Google Scholar 

  • Wong KW (2002) A fast chaotic cryptography scheme with dynamic look up table. Phys Lett A 298(4):238–242

    Article  MathSciNet  MATH  Google Scholar 

  • Xiao D, Shih F, Liao X (2010) A chaos-based hash function with both modification detection and localization capabilities. Commun Nonlinear Sci Numer Simul 15(9):2254–2261

    Article  MathSciNet  MATH  Google Scholar 

  • Xu S, Mu Y, Susilo W (2006) Online/offline signatures and multisignatures for AVOD and DSR routing security. In: Proceedings of ACISP ’06. Lecture notes in computer science. Springer, Berlin, vol 4058, pp 99–110

  • Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fract 37(3):669–674

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

The author would like to thank both anonymous reviewers for their helpful advice. This work was supported by Dr. D.S. Kothari Post-Doctoral fellowship awarded by University Grants Commission, New Delhi, India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chandrashekhar Meshram.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by A. Di Nola.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Meshram, C., Li, CT. & Meshram, S.G. An efficient online/offline ID-based short signature procedure using extended chaotic maps. Soft Comput 23, 747–753 (2019). https://doi.org/10.1007/s00500-018-3112-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-018-3112-2

Keywords

Navigation