Strongly secure certificateless key-insulated signature secure in the standard model

被引:8
作者
Chen, Yanan [1 ,2 ]
Xu, Weixiang [1 ]
Xiong, Hu [3 ]
机构
[1] Beijing Jiaotong Univ, Sch Traff & Transportat, MOE Key Lab Transportat Complex Syst Theory & Tec, Beijing 100044, Peoples R China
[2] JiangXi Univ Sci & Technol, Sch Software, Nanchang 330013, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificateless cryptosystem; Key-insulated signature; Malicious-but-passive KGC attack; Standard model; ENCRYPTION; SCHEME;
D O I
10.1007/s12243-015-0461-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
To protect signing rights against the compromise of secret key, the key-insulated signature (KIS) has attracted a lot of attention from the industry and academia. It would be interesting to investigate the notion of KIS in the certificateless public key cryptography (CL-PKC) environment to solve the problem of certificate management and key escrow simultaneously. To capture the seeming neglected attack mounted by the malicious key generation center (KGC), a stronger security model for the CL-PKC should be considered. In this paper, we first show that the only known CL-KIS scheme is vulnerable against malicious KGC attack, and then propose the first CL-KIS scheme secure against malicious KGC attack, with security proof in the standard model.
引用
收藏
页码:395 / 405
页数:11
相关论文
共 32 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
[Anonymous], 1999, MULTICAST NETWORKING
[3]  
[Anonymous], LNCS
[4]  
Ateniese G., 2007, Network and Distributed System Security Symposium, NDSS 2007, P159
[5]  
Au M. H., 2007, P 2 ACM S INF COMP C, P302
[6]   Secret handshakes from pairing-based key agreements [J].
Balfanz, D ;
Durfee, G ;
Shankar, N ;
Smetters, D ;
Staddon, J ;
Wong, HC .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :180-196
[7]  
Bao F, 2003, LECT NOTES COMPUT SC, V2836, P301
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P209, DOI 10.1145/276698.276741
[10]  
Canetti R, 2003, LECT NOTES COMPUT SC, V2656, P255