Pairing-Free ID-Based Key-Insulated Signature Scheme

被引:0
|
作者
Guo-Bin Zhu [1 ]
Hu Xiong [1 ]
Zhi-Guang Qin [1 ]
机构
[1] School of Computer Science and Engineering, University of Electronic Science and Technology of China
基金
中国国家自然科学基金;
关键词
Identity-based cryptography; key-insulated; random oracle mode; signature;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
Without the assumption that the private keys are kept secure perfectly, cryptographic primitives cannot be deployed in the insecure environments where the key leakage is inevitable. In order to reduce the damage caused by the key exposure in the identity-based(ID-based) signature scenarios efficiently, we propose an ID-based key-insulated signature scheme in this paper, which eliminates the expensive bilinear pairing operations. Compared with the previous work, our scheme minimizes the computation cost without any extra cost. Under the discrete logarithm(DL) assumption, a security proof of our scheme in the random oracle model has also been given.
引用
收藏
页码:33 / 38
页数:6
相关论文
共 50 条
  • [31] Parallel Key-Insulated Signature Scheme without Random Oracles
    Wan, Zhongmei
    Li, Jiguo
    Hong, Xuan
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (03) : 252 - 257
  • [32] A pairing-free and provably secure certificateless signature scheme
    Karati, Arijit
    Islam, S. K. Hafizul
    Biswas, G. P.
    [J]. INFORMATION SCIENCES, 2018, 450 : 378 - 391
  • [33] Cryptanalysis and improvement of a pairing-free certificateless signature scheme
    Pakniat, Nasrollah
    Vanda, Behnam Abasi
    [J]. 2018 15TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2018,
  • [34] An Efficient ID-Based Directed Signature Scheme from Optimal Eta Pairing
    Ku, Junhua
    Yun, Dawei
    Zheng, Bing
    Wei, She
    [J]. COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, 2012, 316 : 440 - 448
  • [35] A hierarchical key-insulated signature scheme in the CA trust model
    Le, ZY
    Yi, OY
    Ford, J
    Makedon, F
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 280 - 291
  • [36] A digital signature scheme on ID-based key-sharing infrastructures
    Nishioka, T
    Hanaoka, G
    Imai, H
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (01) : 214 - 221
  • [37] An enhanced pairing-free certificateless directed signature scheme
    Yang, Kaiqin
    [J]. PLOS ONE, 2022, 17 (02):
  • [38] IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE
    Wan Zhongmei Lai Xuejia Weng Jian Liu Shengli Hong Xuan (Department of Computer Science and Engineering
    [J]. Journal of Electronics(China), 2009, 26 (06) : 853 - 858
  • [39] Attribute-Based Parallel Key-Insulated Signature
    Chen, Jianhong
    Yu, Kun
    Long, Yu
    Chen, Kefei
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (03) : 26 - 40
  • [40] AN IMPROVED CERTIFICATELESS STRONG KEY-INSULATED SIGNATURE SCHEME IN THE STANDARD MODEL
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2015, 9 (03) : 353 - 373