An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage

被引:3
作者
Chen, Peixin [1 ]
Wang, Xiaofeng [1 ]
Su, Jinshu [1 ,2 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[2] Natl Univ Def Technol, Natl Key Lab Parallel & Distributed Proc, Changsha 410073, Hunan, Peoples R China
来源
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015 | 2015年 / 9532卷
关键词
Cryptanalysis; Hierarchical identity-based signature; Key escrow; Bilinear pairing; CDH assumption; SECURE;
D O I
10.1007/978-3-319-27161-3_58
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Hierarchical identity-based cryptography is an efficient technology to address the security issues in cloud storage. However, the inherent key escrow problem primarily hinders the widespread adoption of this cryptosystem in practice. To address the key escrow problem, this paper proposes an escrow-free hierarchical identity-based signature model, in which a user signs messages with a user-selected secret and PKG signing factor apart from the private key. For proving the full security, we formulate three security games with respect to our signature model. We instantiate the escrow-free model into a specific scheme based on the SHER-IBS scheme and prove that our scheme is secure against adaptive chosen ID and message attacks.
引用
收藏
页码:633 / 647
页数:15
相关论文
共 18 条
[1]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[2]  
Camenisch J, 2004, LECT NOTES COMPUT SC, V3152, P56
[3]  
[曹丹 Cao Dan], 2011, [电子与信息学报, Journal of Electronics & Information Technology], V33, P2922
[4]  
Chow SSM, 2004, LECT NOTES COMPUT SC, V3269, P480
[5]   Hierarchical ID-based cryptography [J].
Gentry, C ;
Silverberg, A .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 :548-566
[6]  
Gerbush M, 2012, LECT NOTES COMPUT SC, V7658, P25, DOI 10.1007/978-3-642-34961-4_4
[7]   A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS [J].
GOLDWASSER, S ;
MICALI, S ;
RIVEST, RL .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :281-308
[8]  
Jae Choon Cha, 2002, Public Key Cryptography - PKC 2003. 6th International Workshop on Practice and Theory in Public Key Cryptography. Proceedings (Lecture Notes in Computer Science Vol.2567), P18
[9]  
Kate A, 2010, LECT NOTES COMPUT SC, V6280, P436, DOI 10.1007/978-3-642-15317-4_27
[10]  
Lee B, 2004, ACSW 2004, V32, P69