Strong key-insulated signature in the standard model

被引:2
|
作者
Wan Z.-M. [1 ,2 ]
Lai X.-J. [1 ]
Weng J. [3 ]
Liu S.-L. [1 ]
Long Y. [1 ]
Hong X. [1 ]
机构
[1] Department of Computer Science and Engineering, Shanghai Jiaotong University
[2] College of Science, Hohai University
[3] Department of Computer Science, Jinan University
基金
中国国家自然科学基金;
关键词
bilinear pairing; key exposure; key-insulated; standard model;
D O I
10.1007/s12204-010-1064-5
中图分类号
学科分类号
摘要
The only known construction of key-insulated signature (KIS) that can be proven secure in the standard model is based on the approach of using double signing. That is, the scheme requires two signatures: a signature with a master key and a signature with the signer's secret key. This folklore construction method leads to an inefficient scheme. Therefore it is desirable to devise an efficient KIS scheme. We present the first scheme with such a construction. Our construction derives from some variations of the Waters' signature scheme. It is computationally efficient and the signatures are short. The scheme is provably secure based on the difficulty of computational Diffie-Hellman (CDH) problem in the standard model. © 2010 Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg.
引用
收藏
页码:657 / 661
页数:4
相关论文
共 50 条
  • [1] Strong Key-Insulated Signature in the Standard Model
    万中美
    来学嘉
    翁健
    刘胜利
    龙宇
    洪璇
    [J]. Journal of Shanghai Jiaotong University(Science), 2010, 15 (06) : 657 - 661
  • [2] AN IMPROVED CERTIFICATELESS STRONG KEY-INSULATED SIGNATURE SCHEME IN THE STANDARD MODEL
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2015, 9 (03) : 353 - 373
  • [3] Strong key-insulated signature schemes
    Dodis, Y
    Katz, J
    Xu, SH
    Yung, M
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 130 - 144
  • [4] Strong key-insulated signature scheme supporting multi-helpers in the standard model
    [J]. Yu, J. (qduyujia@gmail.com), 1600, Science Press (51):
  • [5] Certificate-Based Key-Insulated Signature in the Standard Model
    Li, Jiguo
    Du, Haiting
    Zhang, Yichen
    [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1028 - 1039
  • [6] Strongly secure certificateless key-insulated signature secure in the standard model
    Yanan Chen
    Weixiang Xu
    Hu Xiong
    [J]. annals of telecommunications - annales des télécommunications, 2015, 70 : 395 - 405
  • [7] Strongly secure certificateless key-insulated signature secure in the standard model
    Chen, Yanan
    Xu, Weixiang
    Xiong, Hu
    [J]. ANNALS OF TELECOMMUNICATIONS, 2015, 70 (9-10) : 395 - 405
  • [8] Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model
    Lu, Yang
    Li, Jiguo
    Shen, Jian
    [J]. COMPUTER JOURNAL, 2017, 60 (12): : 1729 - 1744
  • [9] Key-insulated aggregate signature
    Zhao, Huiyan
    Yu, Jia
    Duan, Shaoxia
    Cheng, Xiangguo
    Hao, Rong
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (05) : 837 - 846
  • [10] Pairing-based strong key-insulated signature scheme
    Reddy, P. Vasudeva
    Babu, A. Ramesh
    Gayathri, N. B.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (1-2) : 148 - 164