Abstract
Chaos has been dealt with a decent approach to reduce computational complexity while fulfilling security necessities of a cryptographic techniques. In this article, we purpose an efficient online/offline ID-based short signature procedure based on extended chaotic maps and also demonstrated that it is protected under unforgeability of ID-based short signature under chosen message attack. Some of the intriguing arrangements of presented procedures is that it gives multi-time use of the offline stockpiling, which permits the signer to reuse the offline pre-administered information in polynomial time, rather than one-time use in all past online/offline signature procedures.
Similar content being viewed by others
References
Bellare M, Namprempre C, Neven G (2009) Security proofs for identity based identification and signature schemes. J Cryptol 22:1–61
Boneh D, Boyen X (2008) Short signatures without random oracles the SDH assumption in bilinear groups. J Cryptol 2:149–177
Cha J, Cheon J (2003) An identity-based signature from gap Diffie Hellman groups. In: Proceedings of PKC’2003. Lecture notes in computer science. Springer, Berlin, vol 2567, pp 18–30
Chain K, Kuo WC (2013) A new digital signature scheme based on chaotic maps. Nonlinear Dyn 74:1003–1012
Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761
Chen G, Chen Y, Liao X (2007a) An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fractals 31(3):571–579
Chen X, Zhang F, Susilo W, Mu Y (2007b) Efficient generic online/offline signatures without key exposure. In: Proceedings of ACNS ’07. Lecture notes in computer science. Springer, Berlin, vol 4521, pp 18–30
Dachselt F, Schwarz W (2001) Chaos and cryptography. IEEE Trans Circuits Syst I Fundam Theory Appl 48(12):1498–1509
Deng S, Li Y, Xiao D (2010) Analysis and improvement of a chaos-based Hash function construction. Commun Nonlinear Sci Numer Simul 15(5):1338–1347
Even S, Goldreich O, Micali S (1989) On-line/off-line digital signatures. In: Proceedings of CRYPTO ’89. Lecture notes in computer science. Springer, New York, vol 2442, pp 263-277
Galindo D, Garcia F (2009) A schnorr-like lightweight identity-based signature scheme. In: Progress in cryptology-AFRICACRYPT 2009. Lecture notes in computer science. Springer, Berlin, vol 5580, pp 135–148
Gao Y, Zeng P, Raymond Choo KK, Song F (2016) An improved online/offline identity-based signature scheme for WSNs. Int J Netw Secur 18(6):1143–1151
Guillou LC, Quisquater JJ (1989) A “Paradoxical” identity-based signature scheme resulting from zero-knowledge. In: Proceedings of CRYPTO 88. Lecture notes in computer science. Springer, Berlin, vol 403, pp 216–231
Han S, Chang E (2009) Chaotic map based key agreement without clock synchronization. Choas Soliton Fractals 39(3):1283–1289
Herranz J (2005) Deterministic identity-based signatures for partial aggregation. Comput J 49(3):322–330
Hess F (2003) Efficient identity based signature schemes based on pairings. In: Selected area in cryptography, SAC2002. Lecture notes in computer science. Springer, Berlin, vol 2595, pp 310–324
Joye M (2008) An efficient on-line/off-line signature scheme without random oracles. In: Proceedings of CANS ’08. Lecture notes in computer science. Springer, Berlin, vol 5339, pp 98–107
Jye S (2011) A speech encryption using fractional chaotic systems. Nonlinear Dyn 65:103–108
Kang B, Boyd C, Dawson E (2009) A novel identity-based strong designated verifier signature scheme. J Syst Softw 82:270–273
Kar J (2014) Provably secure online/off-line identity-based signature scheme for wireless sensor network. Int J Netw Secur 16(1):29–39
Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1(3):6–21
Kurosawa K, Schmidt-Samoa K (2006) New online/offline signature schemes without random oracles. In: Proceedings of PKC ’06. Lecture notes in computer science. Springer, Berlin, vol 3958, pp 330–346
Lai YM, Cheng PJ, Lee CC, Ku CY (2016) A new ticket-based authentication mechanism for fast handover in mesh network. PLoS ONE 11(5):e0155064
Lee CC, Hsu CW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1–2):201–211
Lee CC, Chen CL, Wu CY, Huang SY (2012) An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn 69(1–2):79–87
Lee CC, Hsu CW, Lai YM, Vasilakos AV (2013) An enhanced mobile-healthcare emergency system based on extended chaotic maps. J Med Syst 37(5):9973
Lee CC, Li CT, Hsu CW (2013) A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn 73(1–2):125–132
Lee CC, Li CT, Chiu ST, Lai YM (2014) A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn 79(4):2485–2495
Lee CC, Lou DC, Li CT, Hsu CW (2014) An extended chaotic-maps-based protocol with key agreement for multiserver environments. Nonlinear Dyn 76(1):853–866
Li F, Shirase M, Takagi T (2008) On the security of online/offline signatures and multisignatures from acisp’06. In: Proceedings of CANS ’08. Lecture notes in computer science. Springer, Berlin, vol 5339, pp 108–119
Li CT, Lee CC, Weng CY (2014) A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J Med Syst 38(9):77
Li CT, Lee CC, Weng CY, Chen SJ (2016) A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J Med Syst 40(11):233
Mason JC, Handscomb DC (2003) Chebyshev polynomials. Chapman and Hall/CRC, Boca Raton
Meshram C (2015) An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem. Inf Process Lett 115(2):351–358
Meshram C (2015) An efficient ID-based beta cryptosystem. Int J Secur Appl 9(2):189–202
Meshram C, Li X (2017) New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group. J Inf Optim Sci 10(1080/02522667):1411013
Meshram C, Meshram S (2013) An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem. Inf Process Lett 113(10–11):375–380
Meshram C, Meshram SA (2017) Constructing new An ID-based cryptosystem for IFP and GDLP based cryptosystem. J Discrete Math Sci Cryptogr 20(5):1121–1134
Meshram C, Obaidat MS (2015) An ID-based quadratic-exponentiation randomized cryptographic scheme. In: IEEE proceeding of international conference on computer, information and telecommunication systems, pp 1–5
Meshram C, Powar PL (2016) An efficient identity-based QER cryptographic scheme. Complex Intell Syst 2(4):285–291
Meshram C, Meshram S, Zhang M (2012) An ID-based cryptographic mechanisms based on GDLP and IFP. Inf Process Lett 112(19):753–758
Meshram C, Powar PL, Obaidat MS, Lee CC (2016a) An IBE technique using partial discrete logarithm. Proc Comput Sci 93:735–741
Meshram C, Powar PL, Obaidat MS (2016b) An UF-IBSS-CMA protected online/offline identity-based short signature technique using PDL. Proc Comput Sci 93:847–853
Meshram C, Lee CC, Li CT, Chen CL (2017a) A secure key authentication scheme for cryptosystems based on GDLP and IFP. Soft Comput 21(24):7285–7291
Meshram C, Tseng YM, Lee CC, Meshram SG (2017b) An IND-ID-CPA secure ID-based cryptographic protocol using GDLP and IFP. Informatica 28(3):471–484
Meshram C, Obaidat MS, Meshram SG (2017c) Chebyshev chaotic maps based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography. Secur Priv. https://doi.org/10.1002/spy2.12
Selvi SD, Sree V, Rangan CP (2011) Identity-based deterministic signature scheme without forking-lemma. Adv Inf Comput Secur 7038:79–95 Lecture Notes in Computer Science
Shamir A, Tauman Y (2001) Improved online/offline signature schemes. In: Proceedings of CRYPTO ’01. Lecture notes in computer science. Springer, Berlin, vol 2139, pp 355–367
Wang Y, Wong K, Liao X, Xiang T (2009) A block cipher with dynamic S-boxes based on tent map. Commun Nonlinear Sci Numer Simul 14(7):3089–3099
Wang X, Yang L, Liu R (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62:615–621
Wang X, Wang X, Zhao J (2011) Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn 63:587–597
Wong KW (2002) A fast chaotic cryptography scheme with dynamic look up table. Phys Lett A 298(4):238–242
Xiao D, Shih F, Liao X (2010) A chaos-based hash function with both modification detection and localization capabilities. Commun Nonlinear Sci Numer Simul 15(9):2254–2261
Xu S, Mu Y, Susilo W (2006) Online/offline signatures and multisignatures for AVOD and DSR routing security. In: Proceedings of ACISP ’06. Lecture notes in computer science. Springer, Berlin, vol 4058, pp 99–110
Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fract 37(3):669–674
Acknowledgements
The author would like to thank both anonymous reviewers for their helpful advice. This work was supported by Dr. D.S. Kothari Post-Doctoral fellowship awarded by University Grants Commission, New Delhi, India.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Communicated by A. Di Nola.
Rights and permissions
About this article
Cite this article
Meshram, C., Li, CT. & Meshram, S.G. An efficient online/offline ID-based short signature procedure using extended chaotic maps. Soft Comput 23, 747–753 (2019). https://doi.org/10.1007/s00500-018-3112-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-018-3112-2