An Efficient Threshold Key-Insulated Signature Scheme

被引:0
|
作者
陈剑洪 [1 ,2 ,3 ]
龙宇 [1 ]
陈克非 [1 ,3 ]
王永涛 [1 ,3 ]
李祥学 [4 ]
机构
[1] Department of Computer Science and Engineering,Shanghai Jiaotong University
[2] School of Computer Engineering,Huaiyin Institute of Technology
[3] Department of Computer Science and Technology,East China Normal University
[4] Shanghai Key Laboratory of Scalable Computing and System,Shanghai Jiaotong University
基金
中国国家自然科学基金;
关键词
threshold key-insulation; signature; random oracle model;
D O I
暂无
中图分类号
TN918 [通信保密与通信安全];
学科分类号
0839 ; 1402 ;
摘要
To tackle the key-exposure problem in signature settings,this paper introduces a new cryptographic primitive named threshold key-insulated signature(TKIS) and proposes a concrete TKIS scheme.For a TKIS system,at least k out of n helpers are needed to update a user’s temporary private key.On the one hand,even if up to k 1 helpers are compromised in addition to the exposure of any of temporary private keys,security of the non-exposed periods is still assured.On the other hand,even if all the n helpers are compromised,we can still ensure the security of all periods as long as none of temporary private keys is exposed.Compared with traditional key-insulated signature(KIS) schemes,the proposed TKIS scheme not only greatly enhances the security of the system,but also provides flexibility and efficiency.
引用
收藏
页码:658 / 662
页数:5
相关论文
共 50 条
  • [21] Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
    Liu, Zhen
    Yang, Guomin
    Wong, Duncan S.
    Khoa Nguyen
    Wang, Huaxiong
    [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 215 - 230
  • [22] Pairing-Free ID-Based Key-Insulated Signature Scheme
    Guo-Bin Zhu
    Hu Xiong
    Zhi-Guang Qin
    [J]. Journal of Electronic Science and Technology, 2015, 13 (01) : 33 - 38
  • [23] Strong key-insulated signature in the standard model
    Wan Z.-M.
    Lai X.-J.
    Weng J.
    Liu S.-L.
    Long Y.
    Hong X.
    [J]. Journal of Shanghai Jiaotong University (Science), 2010, 15 (6) : 657 - 661
  • [24] Pairing-free ID-based key-insulated signature scheme
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu
    610054, China
    [J]. J. Electron. Sci. Technol, 1 (33-38):
  • [25] Parallel Key-insulated Signature: Framework and Construction
    翁健
    陈克非
    李祥学
    刘胜利
    邱卫东
    [J]. Journal of Shanghai Jiaotong University(Science), 2008, (01) : 6 - 11
  • [26] Strong Key-Insulated Signature in the Standard Model
    万中美
    来学嘉
    翁健
    刘胜利
    龙宇
    洪璇
    [J]. Journal of Shanghai Jiaotong University(Science), 2010, 15 (06) : 657 - 661
  • [27] Parallel key-insulated signature: Framework and construction
    Weng J.
    Chen K.-F.
    Li X.-X.
    Liu S.-L.
    Qiu W.-D.
    [J]. Journal of Shanghai Jiaotong University (Science), 2008, 13 (1) : 6 - 11
  • [28] Efficient Identity-Based Parallel Key-Insulated Signature Scheme using Pairings over Elliptic Curves
    Amarapu, R. B.
    Reddy, P. V.
    [J]. JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2018, 77 (01): : 24 - 28
  • [29] Strong key-insulated signature scheme supporting multi-helpers in the standard model
    [J]. Yu, J. (qduyujia@gmail.com), 1600, Science Press (51):
  • [30] IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE
    Wan Zhongmei Lai Xuejia Weng Jian Liu Shengli Hong Xuan (Department of Computer Science and Engineering
    [J]. Journal of Electronics(China), 2009, 26 (06) : 853 - 858