A pairing-free key-insulated certificate-based signature scheme with provable security

被引:8
作者
Xiong, Hu [1 ]
Wu, Shikun [1 ]
Geng, Ji [1 ]
Ahene, Emmanuel [1 ]
Wu, Songyang [2 ]
Qin, Zhiguang [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Sichuan, Peoples R China
[2] Minist Publ Secur, Res Inst 3, Shanghai 201204, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2015年 / 9卷 / 03期
基金
中国国家自然科学基金;
关键词
Key-insulated; certificate-based signature; pairing-free; random oracle model; DIGITAL-SIGNATURES;
D O I
10.3837/tiis.2015.03.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificate-based signature (CBS) combines the advantages of both public key-based signature and identity-based signature, while saving from the disadvantages of drawbacks in both PKS and IBS. The insecure deployment of CBS under the hostile circumstances usually causes the exposure of signing key to be inescapable. To resist the threat of key leakage, we present a pairing-free key insulated CBS scheme by incorporating the idea of key insulated mechanism and CBS. Our scheme eliminates the costly pairing operations and as a matter of fact outperforms the existing key insulated CBS schemes. It is more suitable for low-power devices. Furthermore, the unforgeability of our scheme has been formally proven to rest on the discrete logarithm assumption in the random oracle model.
引用
收藏
页码:1246 / 1259
页数:14
相关论文
共 27 条
[1]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[2]  
[Anonymous], MULT INT RAT AR CRYP
[3]   Security Proofs for Identity-Based Identification and Signature Schemes [J].
Bellare, Mihir ;
Namprempre, Chanathip ;
Neven, Gregory .
JOURNAL OF CRYPTOLOGY, 2009, 22 (01) :1-61
[4]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[5]   A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges [J].
Cao, Xuefei ;
Kou, Weidong ;
Du, Xiaoni .
INFORMATION SCIENCES, 2010, 180 (15) :2895-2903
[6]   Identity-based key agreement protocols from pairings [J].
Chen, L. ;
Cheng, Z. ;
Smart, N. P. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) :213-241
[7]   Elliptic curve cryptography engineering [J].
Cilardo, A ;
Coppolino, L ;
Mazzocca, N ;
Romano, L .
PROCEEDINGS OF THE IEEE, 2006, 94 (02) :395-406
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]  
Dodis Y, 2003, LECT NOTES COMPUT SC, V2567, P130
[10]  
Dodis Y, 2002, LECT NOTES COMPUT SC, V2332, P65