An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles

被引:0
作者
Lu, Yang [1 ]
Li, Jiguo [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat Engn, Nanjing, Jiangsu, Peoples R China
来源
THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010) | 2010年
关键词
public-key encryption; forward security; secret key exposure; standard model; CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the real world, cryptographic computations are often performed on a relatively insecure device which can not be trusted to maintain secrecy of the secret key. Exposure of secret keys is perhaps the most debilitating attack on a cryptosystem since it implies that all security guarantees are lost. The notion of forward security guarantees that the compromise of current secret keys does not compromise past secret keys and past communications. Therefore, it can minimize the resulting damage caused by the exposure of secret keys, and provides a promising approach to deal with the secret key exposure. In this paper, we present an efficient forward-secure public-key encryption scheme and prove it to be secure in the standard model. Most of the performance parameters of our proposed scheme are independent on the total number of time periods. When compared with the previous scheme, our scheme is much more efficient.
引用
收藏
页码:22 / 25
页数:4
相关论文
共 50 条
[41]   Public-Key Encryption with Lazy Parties [J].
Yasunaga, Kenji .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (02) :590-600
[42]   Generic Construction of Forward-Secure Identity-Based Encryption [J].
Lu, Yang ;
Li, Jiguo .
JOURNAL OF COMPUTERS, 2012, 7 (12) :3068-3074
[43]   An efficient and provably secure public key encryption scheme based on coding theory [J].
Lu, Rongxing ;
Lin, Xiaodong ;
Liang, Xiaohui ;
Shen, Xuemin .
SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (12) :1440-1447
[44]   A Forward-Secure Certificate-Based Signature Scheme [J].
Li, Jiguo ;
Teng, Huiyun ;
Huang, Xinyi ;
Zhang, Yichen ;
Zhou, Jianying .
COMPUTER JOURNAL, 2015, 58 (04) :853-866
[45]   Efficient Signcryption Key Encapsulation without Random Oracles [J].
Li, Fagen ;
Shirase, Masaaki ;
Takagi, Tsuyoshi .
INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 :47-+
[46]   Cryptanalysis of an identity based broadcast encryption scheme without random oracles [J].
Wang, Xu An ;
Weng, Jian ;
Yang, Xiaoyuan ;
Yang, Yanjiang .
INFORMATION PROCESSING LETTERS, 2011, 111 (10) :461-464
[47]   An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing [J].
Bo, Yang ;
Zhang, Mingwu ;
Du, Jun-Qiang .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04) :1083-1093
[48]   Multipurpose Public-Key Encryption [J].
Zhang, Rui ;
He, Kai .
ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 :69-84
[49]   Forward-Secure Revocable Identity-Based Encryption [J].
Qin, Baodong ;
Bai, Xue ;
Zheng, Dong ;
Cui, Hui ;
Luo, Yiyuan .
INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 :321-340
[50]   A new forward-secure digital signature scheme [J].
Abdalla, M ;
Reyzin, L .
ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 :116-129