An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles

被引:0
|
作者
Lu, Yang [1 ]
Li, Jiguo [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat Engn, Nanjing, Jiangsu, Peoples R China
关键词
public-key encryption; forward security; secret key exposure; standard model; CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the real world, cryptographic computations are often performed on a relatively insecure device which can not be trusted to maintain secrecy of the secret key. Exposure of secret keys is perhaps the most debilitating attack on a cryptosystem since it implies that all security guarantees are lost. The notion of forward security guarantees that the compromise of current secret keys does not compromise past secret keys and past communications. Therefore, it can minimize the resulting damage caused by the exposure of secret keys, and provides a promising approach to deal with the secret key exposure. In this paper, we present an efficient forward-secure public-key encryption scheme and prove it to be secure in the standard model. Most of the performance parameters of our proposed scheme are independent on the total number of time periods. When compared with the previous scheme, our scheme is much more efficient.
引用
收藏
页码:22 / 25
页数:4
相关论文
共 50 条
  • [21] Adaptively anonymous public-key broadcast encryption scheme without random oracle
    Wang, Hao
    Wu, Lei
    Journal of Networks, 2014, 9 (06) : 1656 - 1663
  • [22] Compact public key encryption without full random oracles
    Yoneyama, Kazuki
    Hanaoka, Goichiro
    PERVASIVE AND MOBILE COMPUTING, 2017, 41 : 286 - 299
  • [23] Secure Public-Key Encryption from Random Oracle Transformation
    Nishioka, Mototsugu
    Komatsu, Naohisa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (04) : 1091 - 1105
  • [24] Threshold public key encryption scheme resilient against continual leakage without random oracles
    Xiujie ZHANG
    Chunxiang XU
    Wenzheng ZHANG
    Wanpeng LI
    Frontiers of Computer Science, 2013, 7 (06) : 955 - 968
  • [25] Threshold public key encryption scheme resilient against continual leakage without random oracles
    Xiujie Zhang
    Chunxiang Xu
    Wenzheng Zhang
    Wanpeng Li
    Frontiers of Computer Science, 2013, 7 : 955 - 968
  • [26] Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search
    JIANG, Z. H. E.
    ZHANG, K. A., I
    WANG, L. I. A. N. G. L. I. A. N. G.
    NING, J. I. A. N. T. I. N. G.
    COMPUTER JOURNAL, 2023, 66 (09): : 2265 - 2278
  • [27] Threshold public key encryption scheme resilient against continual leakage without random oracles
    Zhang, Xiujie
    Xu, Chunxiang
    Zhang, Wenzheng
    Li, Wanpeng
    FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (06) : 955 - 968
  • [28] Forward-secure identity-based encryption scheme
    Yang, Hao-Miao
    Sun, Shi-Xin
    Li, Hong-Wei
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (03): : 534 - 537
  • [29] Efficient and provably secure identification scheme without random oracles
    LI, Yan-ping
    WANG, Yu-min
    Journal of China Universities of Posts and Telecommunications, 2009, 16 (01): : 76 - 80
  • [30] A public-key encryption scheme with pseudo-random ciphertexts
    Möller, B
    COMPUTER SECURITY ESORICS 2004, PROCEEDINGS, 2004, 3193 : 335 - 351