A new key-insulated signature scheme

被引:0
作者
González-Deleito, N [1 ]
Markowitch, O [1 ]
Dall'Olio, E [1 ]
机构
[1] Free Univ Brussels, B-1050 Brussels, Belgium
来源
INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS | 2004年 / 3269卷
关键词
key-insulation; forward-security; signature schemes;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a new strong and perfectly key insulated signature scheme, more efficient than previous proposals and whose key length is constant and independent of the number of insulated time periods. Moreover, unlike previous schemes, it becomes forward secure when all the existing secrets at a given time period are compromised. We also present a variant forward-secure scheme in which an adversary needs to compromise a user at a second time period before being able to compute future secret keys.
引用
收藏
页码:465 / 479
页数:15
相关论文
共 50 条
[1]   Efficient Identity-Based Parallel Key-Insulated Signature Scheme using Pairings over Elliptic Curves [J].
Amarapu, R. B. ;
Reddy, P. V. .
JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2018, 77 (01) :24-28
[2]   Stateless forward-secure key-insulated linkable ring signature scheme in ID-based setting [J].
Odoom, Justice ;
Huang, Xiaofang ;
Wang, Licheng .
JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 129
[3]   Key-Insulated Signcryption [J].
Fan, Jia ;
Zheng, Yuliang ;
Tang, Xiaohu .
JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013, 19 (10) :1351-1374
[4]   Attribute-Based Key-Insulated Encryption [J].
Chen, Jian-Hong ;
Wang, Yong-Tao ;
Chen, Ke-Fei .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (02) :437-449
[5]   Attribute Based Key-Insulated Signatures with Message Recovery [J].
Rao, Y. Sreenivasa ;
Dutta, Ratna .
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 :215-229
[6]   Key-insulated encryption based group key management for wireless sensor network [J].
Qiu Wei-dong ;
Zhou Yao-wei ;
Zhu Bo ;
Zheng Yan-fei ;
Gong Zheng .
JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (05) :1277-1284
[7]   Key-insulated encryption based group key management for wireless sensor network [J].
Wei-dong Qiu ;
Yao-wei Zhou ;
Bo Zhu ;
Yan-fei Zheng ;
Zheng Gong .
Journal of Central South University, 2013, 20 :1277-1284
[8]   Key-insulated encryption based group key management for wireless sensor network [J].
邱卫东 ;
周耀伟 ;
朱博 ;
郑燕飞 ;
龚征 .
JournalofCentralSouthUniversity, 2013, 20 (05) :1277-1284
[9]   Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT [J].
Hong, Hanshu ;
Sun, Zhixin .
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (03) :595-607
[10]   Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT [J].
Hanshu Hong ;
Zhixin Sun .
World Wide Web, 2018, 21 :595-607