An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles

被引:0
|
作者
Lu, Yang [1 ]
Li, Jiguo [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat Engn, Nanjing, Jiangsu, Peoples R China
来源
THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010) | 2010年
关键词
public-key encryption; forward security; secret key exposure; standard model; CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the real world, cryptographic computations are often performed on a relatively insecure device which can not be trusted to maintain secrecy of the secret key. Exposure of secret keys is perhaps the most debilitating attack on a cryptosystem since it implies that all security guarantees are lost. The notion of forward security guarantees that the compromise of current secret keys does not compromise past secret keys and past communications. Therefore, it can minimize the resulting damage caused by the exposure of secret keys, and provides a promising approach to deal with the secret key exposure. In this paper, we present an efficient forward-secure public-key encryption scheme and prove it to be secure in the standard model. Most of the performance parameters of our proposed scheme are independent on the total number of time periods. When compared with the previous scheme, our scheme is much more efficient.
引用
收藏
页码:22 / 25
页数:4
相关论文
共 50 条
  • [1] New forward-secure public-key encryption without random oracles
    Lu, Yang
    Li, Jiguo
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2013, 90 (12) : 2603 - 2613
  • [2] Forward-Secure Identity-Based Public-Key Encryption without Random Oracles
    Yu, Jia
    Cheng, Xiangguo
    Hao, Rong
    Kong, Fanyu
    Fan, Jianxi
    FUNDAMENTA INFORMATICAE, 2011, 111 (02) : 241 - 256
  • [3] Secure public-key encryption scheme without random oracles
    Tan, Chik How
    INFORMATION SCIENCES, 2008, 178 (17) : 3435 - 3442
  • [4] A forward-secure public-key encryption scheme
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 265 - 294
  • [5] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [6] Novel construction of forward-secure public-key encryption in the standard model
    Lu, Y., 1600, Editorial Board of Journal on Communications (35): : 33 - 39+45
  • [7] Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure
    Baek, Joonsang
    Vu, Quang Hieu
    Shoufan, Abdulhadi
    Jones, Andrew
    Wong, Duncan S.
    COMPUTER JOURNAL, 2013, 56 (04) : 497 - 507
  • [8] Non-Interactive Forward-Secure Threshold Signature without Random Oracles
    Yu, Jia
    Kong, Fan-Yu
    Zhao, Hua-Wei
    Cheng, Xiang-Guo
    Hao, Rong
    Guo, Xiang-Fa
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2012, 28 (03) : 571 - 586
  • [9] Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain
    Nuta, Seiya
    Schuldt, Jacob C. N.
    Nishide, Takashi
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 436 - 461
  • [10] Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model
    Sakai, Yusuke
    Hanaoka, Goichiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 165 - 172