Identity-based key-insulated signature without random oracles

被引:2
|
作者
Weng, Jian [1 ,3 ]
Liu, Shengli [1 ,2 ]
Chen, Kefei [1 ]
Ma, ChangShe [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
[2] Xidian Univ, Key Lab CNIS, Xian 710071, Peoples R China
[3] South China Normal Univ, Sch Comp, Guangzhou 510631, Peoples R China
关键词
D O I
10.1109/ICCIAS.2006.295257
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traditional identity-based signature (IBS) schemes typically rely on the assumption that secret keys are kept perfectly secure. However with more and more cryptographic primitives are deployed on insecure devices such as mobile devices, key-exposure seems inevitable. No matter how strong the IBS scheme is, once the secret key is exposed, it will be broken completely. Therefore how to deal with this problem in IBS schemes is a worthwhile challenge. In this paper we apply the key-insulation mechanism to minimize the damage of key-exposure in IBS schemes. We propose a concrete key-insulated ID-based signature scheme. What makes our scheme attractive is that it is provably secure without random oracles.
引用
收藏
页码:1253 / 1258
页数:6
相关论文
共 50 条
  • [1] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, Changshe
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 470 - +
  • [2] Identity-based key-insulated proxy signature without random oracles
    Chen J.-H.
    Long Y.
    Chen K.-F.
    Wang Y.-T.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (05) : 557 - 566
  • [3] Identity-based threshold key-insulated signature without random oracles
    Chen, Jian-Hong
    Shan, Jing-Song
    Yang, Rong-Gen
    Gong, Le-Jun
    Chen, Ke-Fei
    Yu, Kun
    Chen, Li-Qing
    Sun, Cheng-Fu
    [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2013, 47 (08): : 1239 - 1245
  • [4] Identity-Based Key-Insulated Proxy Signature Without Random Oracles
    陈剑洪
    龙宇
    陈克非
    王永涛
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (05) : 557 - 566
  • [5] Identity-based parallel key-insulated signature without random oracles
    Weng, Jian
    Li, Xiang-Xue
    Chen, Ke-Fei
    Liu, Sheng-Li
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2008, 24 (04) : 1143 - 1157
  • [6] Identity-based threshold key-insulated encryption without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Zheng, Dong
    Qiu, Weidong
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 203 - +
  • [7] Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
    Watanabe, Yohei
    Shikata, Junji
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 255 - 279
  • [9] Certificateless key-insulated signature without random oracles
    Wan, Zhong-mei
    Lai, Xue-jia
    Weng, Jian
    Liu, Sheng-li
    Long, Yu
    Hong, Xuan
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A, 2009, 10 (12): : 1790 - 1800
  • [10] Certificateless key-insulated signature without random oracles
    Zhong-mei Wan
    Xue-jia Lai
    Jian Weng
    Sheng-li Liu
    Yu Long
    Xuan Hong
    [J]. Journal of Zhejiang University-SCIENCE A, 2009, 10 : 1790 - 1800