\`x^2+y_1+z_12^34\`
Advanced Search
Article Contents
Article Contents

An improved certificateless strong key-insulated signature scheme in the standard model

Abstract Related Papers Cited by
  • Exposure of secret keys may be the most devastating attack on a public key cryptographic scheme since such that security is entirely lost. The key-insulated security provides a promising approach to deal with this threat since it can effectively mitigate the damage caused by the secret key exposure. To eliminate the cumbersome certificate management in traditional PKI-supported key-insulated signature while overcoming the key escrow problem in identity-based key-insulated signature, two certificateless key-insulated signature schemes without random oracles have been proposed so far. However, both of them suffer from some security drawbacks and do not achieve existential unforgeability. In this paper, we propose a new certificateless strong key-insulated signature scheme that is proven secure in the standard model. Compared with the previous certificateless strong proxy signature scheme, the proposed scheme offers stronger security and enjoys higher computational efficiency and shorter public parameters.
    Mathematics Subject Classification: Primary: 94A60; Secondary: 11T71.

    Citation:

    \begin{equation} \\ \end{equation}
  • [1]

    S. S. Al-Riyami and K. G. Paterson, Certificateless public key cryptography, in Proc. ASIACRYPT 2003, Springer-Verlag, 2003, 452-473.doi: 10.1007/978-3-540-40061-5_29.

    [2]

    J. Baek, R. Safavi-Naini and W. Susilo, Certificateless public key encryption without pairing, in Proc. ISC 2005, Springer-Verlag, 2005, 134-148.

    [3]

    M. Bellare and A. Palacio, Protecting against key exposure: strongly key-insulated encryption with optimal threshold, in Proc. AAECC 2006, Springer-Verlag, 2006, 379-396.doi: 10.1007/s00200-005-0183-y.

    [4]

    K. Y. Choi, J. H. Park, J. Y. Hwang and D. H. Lee, Efficient certificateless signature schemes, in Proc. ACNS 2007, Springer-Verlag, 2007, 443-458.doi: 10.1007/978-3-540-73489-5_5.

    [5]

    A. W. Dent, B. Libert and K. G. Paterson, Certificateless encryption schemes strongly secure in the standard model, in Proc. PKC 2008, Springer-Verlag, 2008, 344-359.doi: 10.1007/978-3-540-78440-1_20.

    [6]

    Y. Dodis, J. Katz, S. Xu and M. Yung, Key-insulated public-key cryptosystems, in Proc. EUROCRYPT 2002, Springer-Verlag, 2002, 65-82.doi: 10.1007/3-540-46035-7_5.

    [7]

    Y. Dodis, J. Katz, S. Xu and M. Yung, Strong key-insulated signature schemes, in Proc. PKC 2003, Springer-Verlag, 2003, 130-144.doi: 10.1007/3-540-36288-6_10.

    [8]

    N. Gonzalez-Deleito, O. Markowitch and E. Dall'Olio, A new key-insulated signature scheme, in Proc. ICICS 2004, Springer-Verlag, 2004, 465-479.

    [9]

    G. Hanaoka, Y. Hanaoka and H. Imai, Parallel key-insulated public key encryption, in Proc. PKC 2006, Springer-Verlag, 2006, 105-122.doi: 10.1007/11745853_8.

    [10]

    Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, Unconditionally secure key insulated cryptosystems: models, bounds and constructions, in Proc. ICICS 2002, Springer-Verlag, 2002, 85-96.doi: 10.1007/3-540-36178-2_5.

    [11]

    Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, Identity-based hierarchical strongly key-insulated encryption and its application, in Proc. ASIACRYPT 2005, Springer-Verlag, 2005, 495-514.doi: 10.1007/11593447_27.

    [12]

    D. He, B. Huang and J. Chen, New certificateless short signature scheme, IET - Information Security, 7 (2013), 113-117.

    [13]

    B. Libert and J. Quisquater, On constructing certificateless cryptosystems from identity based encryption, in Proc. PKC 2006, Springer-Verlag, 2006, 474-490.doi: 10.1007/11745853_31.

    [14]

    J. K. Liu, M. H. Au and W. Susilo, Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model, in Proc. ASIACCS 2007, ACM, 2007, 302-311.

    [15]

    J. K. Liu and D. S. Wong, Solutions to key exposure problem in ring signature, Int. J. Network Sec., 6 (2008), 170-180.

    [16]

    W. Qiu, Y. Zhou, B. Zhu, Y. Zheng, M. Wen and Z. Gong, Key-insulated encryption based key pre-distribution scheme for WSN, in Proc. ISA 2009, Springer-Verlag, 2009, 200-209.

    [17]

    A. Shamir, Identity-based cryptosystems and signature schemes, in Proc. CRYPTO 1984, Springer-Verlag, 1984, 47-53.doi: 10.1007/3-540-39568-7_5.

    [18]

    Y. Sun and H. Li, Short-ciphertext and BDH-based CCA2 secure certificateless encryption, Sci. China Inf. Sci., 53 (2010) 2005-2015.doi: 10.1007/s11432-010-4076-8.

    [19]

    R. Tso, X. Huang and W. Susilo, Strongly secure certificateless short signatures, J. Syst. Software, 85 (2012) 1409-1417.

    [20]

    R. Tso, X. Yi and X. Huang, Efficient and short certificateless signature, in Proc. CANS 2008, Springer-Verlag, 2008, 64-79.

    [21]

    Z. Wan, X. Lai, J. Weng, S. Liu and X. Hong, Identity-based key-insulated proxy signature, J. Electronics (China), 26 (2009) 853-858.

    [22]

    Z. Wan, X. Lai, J. Weng, S. Liu, Y. Long and X. Hong, Certificateless key-insulated signature without random oracles, J. Zhejiang Univ. Sci. A, 10 (2009), 1790-1800.

    [23]

    Z. Wan, X. Meng and X. Hong, Certificateless strong key-insulated signature without random oracles, J. Shanghai Jiaotong Univ. (Sci), 16 (2011), 571-576.

    [24]

    B. Waters, Efficient identity-based encryption without random oracles, in Proc. EUROCRYPT 2005, Springer-Verlag, 2005, 114-127.doi: 10.1007/11426639_7.

    [25]

    J. Weng, S. Liu, K. Chen and C. Ma, Identity-based key-insulated signature without random oracles, in Proc. CIS 2006, Springer-Verlag, 2007, 470-480.doi: 10.1007/11941378_29.

    [26]

    J. Weng, S. Liu, K. Chen, D. Zheng and W. Qiu, Identity-based Threshold key-insulated encryption without random oracles, in Proc. CT-RSA 2008, Springer-Verlag, 2008, 203-220.doi: 10.1007/978-3-540-79263-5_13.

    [27]

    W. Yang, F. Zhang and L. Shen, Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles, Secur. Commun. Networks, 7 (2014) 445-454.

    [28]

    D. H. Yum and P. J. Lee, Efficient key updating signature schemes based on IBS, in Proc. Crypt. Coding 2003, Springer-Verlag, 2003, 16-18.doi: 10.1007/978-3-540-40974-8_14.

    [29]

    F. Zhang, R. Safavi-Naini and W. Susilo, An efficient signature scheme from bilinear parings and its applications, in Proc. PKC 2004, Springer-Verlag, 2004, 277-290.doi: 10.1007/978-3-540-24632-9_20.

    [30]

    Z. Zhang, D. Wong, J. Xu and D. Feng, Certificateless public-key signature: security model and efficient construction, in Proc. ACNS 2006, Springer-Verlag, 2006, 293-308.

    [31]

    Y. Zhou, Z. Cao and Z. Chai, Identity based key insulated signature, in Proc. ISPEC 2006, Springer-Verlag, 2006, 226-234.

  • 加载中
SHARE

Article Metrics

HTML views() PDF downloads(110) Cited by(0)

Access History

Other Articles By Authors

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return