An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles

被引:0
作者
Lu, Yang [1 ]
Li, Jiguo [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat Engn, Nanjing, Jiangsu, Peoples R China
来源
THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010) | 2010年
关键词
public-key encryption; forward security; secret key exposure; standard model; CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the real world, cryptographic computations are often performed on a relatively insecure device which can not be trusted to maintain secrecy of the secret key. Exposure of secret keys is perhaps the most debilitating attack on a cryptosystem since it implies that all security guarantees are lost. The notion of forward security guarantees that the compromise of current secret keys does not compromise past secret keys and past communications. Therefore, it can minimize the resulting damage caused by the exposure of secret keys, and provides a promising approach to deal with the secret key exposure. In this paper, we present an efficient forward-secure public-key encryption scheme and prove it to be secure in the standard model. Most of the performance parameters of our proposed scheme are independent on the total number of time periods. When compared with the previous scheme, our scheme is much more efficient.
引用
收藏
页码:22 / 25
页数:4
相关论文
共 50 条
[21]   Forward-secure ID based digital signature scheme with forward-secure private key generator [J].
Oh, Hyunok ;
Kim, Jihye ;
Shin, Ji Sun .
INFORMATION SCIENCES, 2018, 454 :96-109
[22]   An Efficient Public-Key Dual-Receiver Encryption Scheme [J].
Gao, Chenglong ;
Chen, Kai ;
Wang, Qiang ;
Chen, Zhixian .
IEEE ACCESS, 2022, 10 :10799-10805
[23]   A CCA2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles [J].
Wang, Shengbao ;
Zeng, Peng ;
Choo, Kim-Kwang Raymond ;
Wang, Hongbing .
INFORMATICA, 2015, 26 (03) :543-556
[24]   An Efficient and Flexible Forward-Secure Signature Scheme [J].
Huang, Hui-Feng ;
Chang, Chin -Chen .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (3B) :211-219
[25]   Tightly secure signatures and public-key encryption [J].
Hofheinz, Dennis ;
Jager, Tibor .
DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (01) :29-61
[26]   Tightly secure signatures and public-key encryption [J].
Dennis Hofheinz ;
Tibor Jager .
Designs, Codes and Cryptography, 2016, 80 :29-61
[27]   Tightly Secure Signatures and Public-Key Encryption [J].
Hofheinz, Dennis ;
Jager, Tibor .
ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 :590-607
[28]   Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience [J].
Qin, Baodong ;
Liu, Shengli ;
Chen, Kefei .
IET INFORMATION SECURITY, 2015, 9 (01) :32-42
[29]   A New Forward-Secure Authenticated Encryption Scheme with Message Linkages [J].
LI Yanping~ 1 ;
2. College of Mathematics and Information Science .
Wuhan University Journal of Natural Sciences, 2006, (06) :1537-1540
[30]   Combining Public-Key Encryption with Digital Signature Scheme [J].
Alia, Mohammad Ahmad .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2016, 2017, 533 :870-878