Identity-based key-insulated signature without random oracles

被引:2
|
作者
Weng, Jian [1 ,3 ]
Liu, Shengli [1 ,2 ]
Chen, Kefei [1 ]
Ma, ChangShe [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
[2] Xidian Univ, Key Lab CNIS, Xian 710071, Peoples R China
[3] South China Normal Univ, Sch Comp, Guangzhou 510631, Peoples R China
来源
2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS | 2006年
关键词
D O I
10.1109/ICCIAS.2006.295257
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traditional identity-based signature (IBS) schemes typically rely on the assumption that secret keys are kept perfectly secure. However with more and more cryptographic primitives are deployed on insecure devices such as mobile devices, key-exposure seems inevitable. No matter how strong the IBS scheme is, once the secret key is exposed, it will be broken completely. Therefore how to deal with this problem in IBS schemes is a worthwhile challenge. In this paper we apply the key-insulation mechanism to minimize the damage of key-exposure in IBS schemes. We propose a concrete key-insulated ID-based signature scheme. What makes our scheme attractive is that it is provably secure without random oracles.
引用
收藏
页码:1253 / 1258
页数:6
相关论文
共 50 条
  • [1] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, Changshe
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 470 - +
  • [2] Identity-Based strong key-insulated signature without random oracles
    Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    不详
    不详
    Ruan Jian Xue Bao, 2008, 6 (1555-1564):
  • [3] Identity-based threshold key-insulated signature without random oracles
    Chen, Jian-Hong
    Shan, Jing-Song
    Yang, Rong-Gen
    Gong, Le-Jun
    Chen, Ke-Fei
    Yu, Kun
    Chen, Li-Qing
    Sun, Cheng-Fu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2013, 47 (08): : 1239 - 1245
  • [4] Identity-based key-insulated proxy signature without random oracles
    Chen J.-H.
    Long Y.
    Chen K.-F.
    Wang Y.-T.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (05) : 557 - 566
  • [5] Identity-based parallel key-insulated signature without random oracles
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    不详
    不详
    J. Inf. Sci. Eng., 2008, 4 (1143-1157):
  • [6] Identity-Based Key-Insulated Proxy Signature Without Random Oracles
    陈剑洪
    龙宇
    陈克非
    王永涛
    Journal of Shanghai Jiaotong University(Science), 2011, 16 (05) : 557 - 566
  • [7] Identity-based parallel key-insulated signature without random oracles
    Weng, Jian
    Li, Xiang-Xue
    Chen, Ke-Fei
    Liu, Sheng-Li
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2008, 24 (04) : 1143 - 1157
  • [8] Identity-based threshold key-insulated encryption without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Zheng, Dong
    Qiu, Weidong
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 203 - +
  • [9] Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
    Watanabe, Yohei
    Shikata, Junji
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 255 - 279