A new key-insulated signature scheme

被引:0
作者
González-Deleito, N [1 ]
Markowitch, O [1 ]
Dall'Olio, E [1 ]
机构
[1] Free Univ Brussels, B-1050 Brussels, Belgium
来源
INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS | 2004年 / 3269卷
关键词
key-insulation; forward-security; signature schemes;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a new strong and perfectly key insulated signature scheme, more efficient than previous proposals and whose key length is constant and independent of the number of insulated time periods. Moreover, unlike previous schemes, it becomes forward secure when all the existing secrets at a given time period are compromised. We also present a variant forward-secure scheme in which an adversary needs to compromise a user at a second time period before being able to compute future secret keys.
引用
收藏
页码:465 / 479
页数:15
相关论文
共 50 条
[21]   Revisiting the Cubic UOV Signature Scheme [J].
Duong, Dung H. ;
Petzoldt, Albrecht ;
Wang, Yacheng ;
Takagi, Tsuyoshi .
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2016, 2017, 10157 :223-238
[22]   HMFEv - An Efficient Multivariate Signature Scheme [J].
Petzoldt, Albrecht ;
Chen, Ming-Shing ;
Ding, Jintai ;
Yang, Bo-Yin .
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2017, 2017, 10346 :205-223
[23]   An Efficient Forward Secure Signature Scheme [J].
于佳 ;
孔凡玉 ;
李大兴 .
JournalofShanghaiJiaotongUniversity(Science), 2006, (02) :242-247
[24]   On the security of a group signature scheme with forward security [J].
Wang, GL .
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 :27-39
[25]   A Signature Scheme Based on the Intractability of Computing Roots [J].
Ingrid Biehl ;
Johannes Buchmann ;
Safuat Hamdy ;
Andreas Meyer .
Designs, Codes and Cryptography, 2002, 25 :223-236
[26]   A signature scheme based on the intractability of computing roots [J].
Biehl, I ;
Buchmann, J ;
Hamdy, S ;
Meyer, A .
DESIGNS CODES AND CRYPTOGRAPHY, 2002, 25 (03) :223-236
[27]   A Further Improved Online/Offline Signature Scheme [J].
Gao, Chong-zhi ;
Yao, Zheng-an .
FUNDAMENTA INFORMATICAE, 2009, 91 (3-4) :523-532
[28]   Universally composable key-evolving signature [J].
Zhou, Jin ;
Zhu, YueFei ;
Chang, TingMao ;
Zhang, YaJuan .
6TH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS, 2007, :97-+
[29]   Bilateral-secure Signature by Key Evolving [J].
Xiang, Tao ;
Li, Xiaoguo ;
Chen, Fei ;
Mu, Yi .
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :523-533
[30]   Lattice-based strongly-unforgeable forward-secure identity-based signature scheme with flexible key update [J].
Zhang, Xiangsong ;
Liu, Zhenhua .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (05) :2792-2810