Journal of Shanghai Jiaotong University ›› 2013, Vol. 47 ›› Issue (08): 1239-1245.

• Automation Technique, Computer Technology • Previous Articles     Next Articles

Identity-based Threshold Key-insulated Signature Without Random Oracles
 

CHEN Jianhong1,2,SHAN Jingsong1,YANG Ronggen1,GONG Lejun1,CHEN Kefei 2,YU Kun1,CHEN Liqing1,SUN Chengfu1
  

  1. (1. Faculty of Computer Engineering, Huaiyin Institute of Technology, Huaian 223003, Jiangsu, China; 2. Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, 200240)
     
  • Received:2012-09-17 Online:2013-08-29 Published:2013-08-29

Abstract:

To minimize the damage caused by key-exposure in ID-based signature scenarios, this paper  proposed an identity-based threshold key-insulated signature scheme by using Weng et al.’s threshold key-insulated mechanism. The formal proof of security was presented in the standard model, i.e. without random oracles.

Key words: threshold keyinsulated, identitybased, signature

CLC Number: