AN IMPROVED CERTIFICATELESS STRONG KEY-INSULATED SIGNATURE SCHEME IN THE STANDARD MODEL

被引:8
作者
Lu, Yang [1 ]
Zhang, Quanling [1 ]
Li, Jiguo [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat Engn, Nanjing 211100, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificate less strong key-insulated signature; secret key exposure; key replacement attack; malicious KGC attack; standard model;
D O I
10.3934/amc.2015.9.353
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Exposure of secret keys may be the most devastating attack on a public key cryptographic scheme since such that security is entirely lost. The key-insulated security provides a promising approach to deal with this threat since it can effectively mitigate the damage caused by the secret key exposure. To eliminate the cumbersome certificate management in traditional PKI-supported key-insulated signature while overcoming the key escrow problem in identity-based key-insulated signature, two certificateless key-insulated signature schemes without random oracles have been proposed so far. However, both of them suffer from some security drawbacks and do not achieve existential unforgeability. In this paper, we propose a new certificateless strong key-insulated signature scheme that is proven secure in the standard model. Compared with the previous certificateless strong proxy signature scheme, the proposed scheme offers stronger security and enjoys higher computational efficiency and shorter public parameters.
引用
收藏
页码:353 / 373
页数:21
相关论文
共 31 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [2] [Anonymous], P 2 ACM S INF COMP C
  • [3] [Anonymous], 2008, International Journal of Network Security
  • [4] Baek J, 2005, LECT NOTES COMPUT SC, V3650, P134
  • [5] Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
    Belare, M
    Palacio, A
    [J]. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2006, 16 (06) : 379 - 396
  • [6] Choi KY, 2007, LECT NOTES COMPUT SC, V4521, P443
  • [7] Dent AW, 2008, LECT NOTES COMPUT SC, V4939, P344, DOI 10.1007/978-3-540-78440-1_20
  • [8] Dodis Y, 2003, LECT NOTES COMPUT SC, V2567, P130
  • [9] Dodis Y, 2002, LECT NOTES COMPUT SC, V2332, P65
  • [10] González-Deleito N, 2004, LECT NOTES COMPUT SC, V3269, P465