Distributed Private-Key Generation Scheme with Self-Certified Identity

被引:0
|
作者
Xie, Yongming [1 ]
Wang, Guojun [1 ]
机构
[1] Cent South Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
DKG; Self-Certified Identity; IBE; BDID Card; ENCRYPTION;
D O I
10.1109/TrustCom.2011.65
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In an identity-based encryption (IBE) system, a private-key generator (PKG) is assumed to be credible, which takes charge of identity authentication and private-key issuing for users. However, the reliability of IBE may be questioned since this assumption does not always hold. In this paper, we propose a new distributed private-key generation scheme with self-certified identity (SCI-DKG) which does not need any PKG. SCI-DKG takes advantage of distributed private-key generation and self certification to remove PKG from IBE. Comparing with the existing IBE schemes, a user and his identity can be independently authenticated through his blind digital ID (BDID) card and identity signature. In the meanwhile, a user can extract private keys from other users' sharing packets containing secret shares, partial public parameters and BDID cards. The proposed scheme significantly extends IBE without involvement of PKGs, and provides a promising solution for applications where PKG is not always available. Theoretical analysis demonstrates that our scheme is secure and effective.
引用
收藏
页码:501 / 508
页数:8
相关论文
共 50 条
  • [1] An identity (ID)-based and self-certified secret sharing scheme
    Pei Q.-Q.
    Ma J.-F.
    Pang L.-J.
    Zhang H.-B.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (01): : 152 - 156
  • [2] Distributed Private-Key Generators for Identity-Based Cryptography
    Kate, Aniket
    Goldberg, Ian
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 436 - 453
  • [3] A Identification and Key Establishment Scheme based on Self-Certified Public Key for MANETs
    Zhang, Dongwei
    Sun, Yi
    Luo, Yuanyan
    [J]. 2018 INTERNATIONAL SEMINAR ON COMPUTER SCIENCE AND ENGINEERING TECHNOLOGY (SCSET 2018), 2019, 1176
  • [4] Identity-based and self-certified key-exchange protocols
    Saeednia, S
    [J]. INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 303 - 313
  • [5] Improvement of threshold signature scheme using self-certified public key
    Li, Jiguo
    Zhang, Yichen
    Wang, Zhijian
    [J]. ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 480 - +
  • [6] User authentication scheme based on self-certified public-key for next generation wireless network
    He, Dake
    Wang, Jianbo
    Zheng, Yu
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 33 - 40
  • [7] New self-certified key distribution scheme based on the elliptic curve cryptosystem
    Xiao, You-An
    Zhou, Zu-De
    [J]. Dalian Haishi Daxue Xuebao/Journal of Dalian Maritime University, 2007, 33 (04): : 56 - 59
  • [8] A Signcryption Scheme Based on Self-Certified Cryptography
    LIU Zhiyuan
    CHEN Jing
    [J]. Wuhan University Journal of Natural Sciences, 2014, 19 (02) : 169 - 172
  • [9] Key management scheme for ad hoc networks using self-certified public key system
    Hu, Rong-Lei
    Liu, Jian-Wei
    Zhang, Qi-Shan
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (06): : 943 - 947
  • [10] Self-certified signature scheme from pairings
    Shao, Zuhua
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (03) : 388 - 395