Combined schemes for signature and encryption: The public-key and the identity-based setting

被引:5
|
作者
Gonzalez Vasco, Maria Isabel [1 ]
Hess, Florian [2 ]
Steinwandt, Rainer [3 ]
机构
[1] Univ Rey Juan Carlos, Dept Matemat Aplicada, C Tulipan S-N, Madrid 28933, Spain
[2] Carl von Ossietzky Univ Oldenburg, Inst Math, D-26111 Oldenburg, Germany
[3] Florida Atlantic Univ, Dept Math Sci, 777 Glades Rd, Boca Raton, FL 33431 USA
关键词
Combined scheme; Identity-based cryptography; Public-key cryptography; Key separation; SECURITY PROOFS;
D O I
10.1016/j.ic.2015.11.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Consider a scenario in which parties use a public-key encryption scheme and a signature scheme with a single public key/private key pair-so the private key sk is used for both signing and decrypting. Such a simultaneous use of a key is in general considered poor cryptographic practice, but from an efficiency point of view looks attractive. We offer security notions to analyze such violations of key separation. For both the identity- and the non-identity-based setting, we show that-although being insecure in general-for schemes of interest the resulting combined scheme can offer strong security guarantees. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 50 条
  • [1] Broadcast encryption using identity-based public-key cryptosystem
    Lv, XX
    Yang, B
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 1092 - 1097
  • [2] Efficient identity-based public-key quantum signature scheme
    Xin, Xiangjun
    Wang, Zhuo
    Yang, Qinglan
    Li, Fagen
    [J]. INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2020, 34 (10):
  • [3] Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems
    Chen, Jiahui
    Ling, Jie
    Ning, Jianting
    Ding, Jintai
    [J]. COMPUTER JOURNAL, 2019, 62 (08): : 1132 - 1147
  • [4] Mediated Hierarchical Identity-Based Combined Public Key Schemes
    Wang, Pingjian
    Lin, Jingqiang
    Jing, Jiwu
    Xie, Yongquan
    [J]. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 614 - 618
  • [5] Forward-Secure Identity-Based Public-Key Encryption without Random Oracles
    Yu, Jia
    Cheng, Xiangguo
    Hao, Rong
    Kong, Fanyu
    Fan, Jianxi
    [J]. FUNDAMENTA INFORMATICAE, 2011, 111 (02) : 241 - 256
  • [6] Quantum-resistant public-key encryption and signature schemes with smaller key sizes
    Soni, Lacchita
    Chandra, Harish
    Gupta, Daya Sagar
    Keval, Ram
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (01): : 285 - 297
  • [7] Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes
    Lai, Qi-Qi
    Yang, Bo
    Yu, Yong
    Xia, Zhe
    Zhou, Yan-Wei
    Chen, Yuan
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (06) : 1243 - 1260
  • [8] Quantum-resistant public-key encryption and signature schemes with smaller key sizes
    Lacchita Soni
    Harish Chandra
    Daya Sagar Gupta
    Ram Keval
    [J]. Cluster Computing, 2024, 27 : 285 - 297
  • [9] Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes
    Qi-Qi Lai
    Bo Yang
    Yong Yu
    Zhe Xia
    Yan-Wei Zhou
    Yuan Chen
    [J]. Journal of Computer Science and Technology, 2018, 33 : 1243 - 1260
  • [10] Dealerless Corporate Key Generation for Identity-Based Encryption Schemes
    Liu, Zhen
    Wong, Duncan S.
    Poon, Jack
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 211 - 222