Attribute Based Key-Insulated Signatures with Message Recovery

被引:1
|
作者
Rao, Y. Sreenivasa [1 ]
Dutta, Ratna [1 ]
机构
[1] Indian Inst Technol, Kharagpur 721302, W Bengal, India
关键词
Attribute based signature; Key-insulation; Message recovery; Linear secret-sharing scheme; Constant message-signature length;
D O I
10.1007/978-3-319-21966-0_16
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In order tominimize the impact of secret signing key exposure in attribute based signature scenario, we design two attribute based key-insulated signature (ABKIS) with message recovery schemes for expressive linear secret-sharing scheme (LSSS)-realizable access structures utilizing only 4 bilinear pairing operations in verification process and making the message-signature length constant. The first scheme deals with small universes of attributes while the second construction supports large universe of attributes. The signing key is computed according to LSSS access structure over signer's attributes, and is later updated at discrete time periods with the help of a physically secure but computationally limited device, called helper, without changing the access structure. A signing key for some time period is used to sign every message during that time period. The original message is not required to be transmitted with the signature, however, it can be recovered during verification procedure. The size of signing key in the proposed schemes is quadratic in number of attributes. The (strong) key-insulated security of our ABKIS primitives is reduced to the classical computational Diffie Hellman Exponent problem in selective attribute set and random oracle model. We also show that both the proposed signature constructions provide signer privacy.
引用
收藏
页码:215 / 229
页数:15
相关论文
共 50 条
  • [21] An Improvement of an Identity-Based Key-insulated Signcryption
    Zhu, Guobin
    Xiong, Hu
    Wang, Ruijin
    Qin, Zhiguang
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 97 - 104
  • [22] Parallel key-insulated public key encryption
    Hanaoka, Goichiro
    Hanaoka, Yumiko
    Imai, Hideki
    PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 105 - 122
  • [23] An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network
    Hsu, Chien-Lung
    Lin, Han-Yu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (11): : 2928 - 2940
  • [24] ID-based Key-insulated Authenticated Key Agreement Protocol
    周渊
    程晓明
    柴震川
    Journal of Shanghai Jiaotong University, 2007, (02) : 247 - 249
  • [25] An Efficient Key-Insulated Signature Scheme
    Liang, Xiangqian
    Wang, Yandong
    Gao, Dezhi
    Zhang, Yonghua
    ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 29 - +
  • [26] A new key-insulated signature scheme
    González-Deleito, N
    Markowitch, O
    Dall'Olio, E
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 465 - 479
  • [27] Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT
    Hong, Hanshu
    Sun, Zhixin
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (03): : 595 - 607
  • [28] Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT
    Hanshu Hong
    Zhixin Sun
    World Wide Web, 2018, 21 : 595 - 607
  • [29] Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN
    Qiu, Weidong
    Zhou, Yaowei
    Zhu, Bo
    Zheng, Yanfei
    Wen, Mi
    Gong, Zheng
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 200 - +
  • [30] Strong key-insulated signature schemes
    Dodis, Y
    Katz, J
    Xu, SH
    Yung, M
    PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 130 - 144