Strongly secure certificateless key-insulated signature secure in the standard model

被引:7
|
作者
Chen, Yanan [1 ,2 ]
Xu, Weixiang [1 ]
Xiong, Hu [3 ]
机构
[1] Beijing Jiaotong Univ, Sch Traff & Transportat, MOE Key Lab Transportat Complex Syst Theory & Tec, Beijing 100044, Peoples R China
[2] JiangXi Univ Sci & Technol, Sch Software, Nanchang 330013, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificateless cryptosystem; Key-insulated signature; Malicious-but-passive KGC attack; Standard model; ENCRYPTION; SCHEME;
D O I
10.1007/s12243-015-0461-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
To protect signing rights against the compromise of secret key, the key-insulated signature (KIS) has attracted a lot of attention from the industry and academia. It would be interesting to investigate the notion of KIS in the certificateless public key cryptography (CL-PKC) environment to solve the problem of certificate management and key escrow simultaneously. To capture the seeming neglected attack mounted by the malicious key generation center (KGC), a stronger security model for the CL-PKC should be considered. In this paper, we first show that the only known CL-KIS scheme is vulnerable against malicious KGC attack, and then propose the first CL-KIS scheme secure against malicious KGC attack, with security proof in the standard model.
引用
收藏
页码:395 / 405
页数:11
相关论文
共 50 条
  • [1] Strongly secure certificateless key-insulated signature secure in the standard model
    Yanan Chen
    Weixiang Xu
    Hu Xiong
    [J]. annals of telecommunications - annales des télécommunications, 2015, 70 : 395 - 405
  • [2] Security analysis on "Strongly secure certificateless key-insulated signature secure in the standard model"
    Wang, Feng
    Xu, Li
    Pan, Jeng-Shyang
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 195 - 198
  • [3] AN IMPROVED CERTIFICATELESS STRONG KEY-INSULATED SIGNATURE SCHEME IN THE STANDARD MODEL
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2015, 9 (03) : 353 - 373
  • [4] Efficient and secure pairing-free certificateless strong key-insulated signature scheme
    Babu, A. Ramesh
    Gayathri, N. B.
    Reddy, P. Vasudeva
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2019, 23 (03) : 155 - 166
  • [5] Efficient and Provably Secure Certificateless Parallel Key-Insulated Signature Without Pairing for IIoT Environments
    Xiong, Hu
    Mei, Qian
    Zhao, Yanan
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 310 - 320
  • [6] Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model
    Zhu, Guobin
    Xiong, Hu
    Qin, Zhiguang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (02) : 1401 - 1416
  • [7] Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model
    Guobin Zhu
    Hu Xiong
    Zhiguang Qin
    [J]. Wireless Personal Communications, 2014, 79 : 1401 - 1416
  • [8] Strong key-insulated signature in the standard model
    Wan Z.-M.
    Lai X.-J.
    Weng J.
    Liu S.-L.
    Long Y.
    Hong X.
    [J]. Journal of Shanghai Jiaotong University (Science), 2010, 15 (6) : 657 - 661
  • [9] Strong Key-Insulated Signature in the Standard Model
    万中美
    来学嘉
    翁健
    刘胜利
    龙宇
    洪璇
    [J]. Journal of Shanghai Jiaotong University(Science), 2010, 15 (06) : 657 - 661
  • [10] Certificateless threshold signature secure in the standard model
    Xiong, Hu
    Li, Fagen
    Qin, Zhiguang
    [J]. INFORMATION SCIENCES, 2013, 237 : 73 - 81