Identity-based key-insulated signature with secure key-updates

被引:0
|
作者
Weng, Jian [1 ]
Liu, Shengli [1 ,2 ]
Chen, Kefei [1 ]
Li, Xiangxue [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
[2] Xidian Univ, Key Lab CNIS, Xian 710071, Peoples R China
关键词
key-insulated; identity-based signature; key-exposure; bilinear pairings;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Standard identity-based (ID-based) signature schemes typically rely on the assumption that secret keys are kept perfectly secure. However, with more and more cryptographic primitives are deployed on insecure devices (e.g. mobile devices), key-exposure seems inevitable. This problem is perhaps the most devastating attack on a cryptosystem since it typically means that security is entirely lost. To minimize the damage caused by key-exposure in ID-based signatures scenarios, Zhou et al. [32] applied Dodis et al.'s key-insulation mechanism [12] and proposed an ID-based key-insulated signature (IBKIS) scheme. However, their scheme is not strong key-insulated, i.e, if an adversary compromises the helper key, he can derive all the temporary secret keys and sign messages on behalf the legitimate user. In this paper, we re-formalize the definition and security notions for IBKIS schemes, and then propose a new IBKIS scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also enjoys desirable properties such as unbounded number of time periods and random-access key-updates.
引用
收藏
页码:13 / +
页数:3
相关论文
共 50 条
  • [1] IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE
    Wan Zhongmei Lai Xuejia Weng Jian Liu Shengli Hong Xuan (Department of Computer Science and Engineering
    [J]. Journal of Electronics(China), 2009, 26 (06) : 853 - 858
  • [2] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, Changshe
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 470 - +
  • [3] Identity-based parallel key-insulated signature: Framework and construction
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Li, Xiangxue
    [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2008, 40 (01): : 55 - 68
  • [4] Generic Construction of Identity-Based Strong Key-Insulated Signature
    Zhou, Dehua
    Weng, Jian
    Chen, Kefei
    Zheng, Dong
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (04): : 629 - 635
  • [5] Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings
    Reddy, P. Vasudeva
    Babu, A. Ramesh
    Gayathri, N. B.
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (10) : 1211 - 1218
  • [6] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, ChangShe
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1253 - 1258
  • [7] Identity-based parallel key-insulated signature: Framework and construction
    Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
    不详
    不详
    [J]. J. Res. Pract. Inf. Technol., 2008, 1 (55-68):
  • [8] Identity-Based Key-Insulated Signcryption
    Chen, Jianhong
    Chen, Kefei
    Wang, Yongtao
    Li, Xiangxue
    Long, Yu
    Wan, Zhongmei
    [J]. INFORMATICA, 2012, 23 (01) : 27 - 45
  • [9] Identity-Based strong key-insulated signature without random oracles
    Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    不详
    不详
    [J]. Ruan Jian Xue Bao, 2008, 6 (1555-1564):
  • [10] Identity-based threshold key-insulated signature without random oracles
    Chen, Jian-Hong
    Shan, Jing-Song
    Yang, Rong-Gen
    Gong, Le-Jun
    Chen, Ke-Fei
    Yu, Kun
    Chen, Li-Qing
    Sun, Cheng-Fu
    [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2013, 47 (08): : 1239 - 1245