上海交通大学学报(英文版) ›› 2011, Vol. 16 ›› Issue (6): 658-662.doi: 10.1007/s12204-011-1207-3
CHEN Jian-hong (陈剑洪), LONG Yu (龙 宇), CHEN Ke-fei (陈克非) WANG Yong-tao (王永涛),LI Xiang-xue (李祥学)
收稿日期:
2010-01-28
出版日期:
2011-12-30
发布日期:
2012-01-12
通讯作者:
CHEN Jian-hong (陈剑洪)
E-mail:chenjianhong_cis@sjtu.edu.cn
CHEN Jian-hong (陈剑洪), LONG Yu (龙 宇), CHEN Ke-fei (陈克非) WANG Yong-tao (王永涛),LI Xiang-xue (李祥学)
Received:
2010-01-28
Online:
2011-12-30
Published:
2012-01-12
Contact:
CHEN Jian-hong (陈剑洪)
E-mail:chenjianhong_cis@sjtu.edu.cn
摘要: To tackle the key-exposure problem in signature settings,
this paper introduces a new cryptographic primitive named threshold key-insulated
signature (TKIS) and proposes a concrete TKIS scheme.For a TKIS system, at
least k out of n helpers are needed to update a user's temporary private key.
On the one hand, even if up to k-1 helpers are compromised in addition to the
exposure of any of temporary private keys, security of the non-exposed
periods is still assured. On the other hand, even if all the n helpers are
compromised, we can still ensure the security of all periods as long as none
of temporary private keys is exposed. Compared with traditional
key-insulated signature (KIS) schemes, the proposed TKIS scheme not only
greatly enhances the security of the system, but also provides flexibility
and efficiency.
中图分类号:
CHEN Jian-hong (陈剑洪), LONG Yu (龙 宇), CHEN Ke-fei (陈克非) WANG Yong-tao. An Efficient Threshold Key-Insulated Signature Scheme[J]. 上海交通大学学报(英文版), 2011, 16(6): 658-662.
CHEN Jian-hong (陈剑洪), LONG Yu (龙 宇), CHEN Ke-fei (陈克非) WANG Yong-tao (王永涛),LI Xiang-xue (李祥学). An Efficient Threshold Key-Insulated Signature Scheme[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(6): 658-662.
1 Dodis Y, Katz J, Xu S, et al. Key-insulated public-key cryptosystems [C]// Proceedings of EUROCRYPT'02: LNCS 2332. Berlin: Springer-Verlag, 2002: 65-82. 2 Hanaoka G, Hanaoka Y, Imai H. Parallel key-insulated public key encryption [C]// Proceedings of PKC'06: LNCS 3958. Berlin: Springer-Verlag, 2006: 105-122. 3 Weng J, Liu S, et al. Identity-based threshold key-insulated encryption without random oracles [C]// Proceedings of CT-RSA'08: LNCS 4964. Berlin, Germany: Springer-Verlag, 2008: 203-220. 4 Dodis Y, Katz J, Xu S, et al. Strong key-insulated signature schemes [C]// Proceedings of PKC'03: LNCS 2567. Berlin, Germany: Springer-Verlag, 2003: 130-144. 5 Weng J, Chen K, Li X, et al. Parallel key-insulated signature: Framework and construction [J]. Journal of Shanghai Jiaotong University (Science), 2008, 13 (1): 6-11. 6 Waters B. Efficient identity-based encryption without random oracles [C]// Proceedings of EUROCRYPT'05: LNCS 3494. Berlin, Germany: Springer-Verlag, 2005: 114-127. 7 Boneh D, Franklin M. Identity based encryption from the weil pairing [C]// Proceedings of CRYPTO'01: LNCS 2139. Berlin, Germany: Springer-Verlag, 2001: 213-229. |
[1] | MIRZAEE Siavash, JIANG Letian *(蒋乐天). Fast Confidentiality-Preserving Authentication for Vehicular Ad Hoc Networks[J]. Journal of Shanghai Jiao Tong University (Science), 2019, 24(1): 31-40. |
[2] | GAO Wen* (高雯), HU Yupu (胡予濮), ZHANG Yanhua (张彦华), WANG Baocang (王保仓). Lattice-Based Group Signature with Verifier-Local Revocation[J]. 上海交通大学学报(英文版), 2017, 22(3): 313-321. |
[3] | LONG Yu1* (龙宇), CHEN Ke-fei2 (陈克非), MAO Xian-ping1 (毛贤平). New Constructions of Dynamic Threshold Cryptosystem[J]. 上海交通大学学报(英文版), 2014, 19(4): 431-435. |
[4] | MAO Xian-ping1 (毛贤平), CHEN Ke-fei2*(陈克非), LONG Yu1 (龙宇), WANG Liang-liang1 (王亮亮). Attribute-Based Signature on Lattices[J]. 上海交通大学学报(英文版), 2014, 19(4): 406-411. |
[5] | MING Yang (明 洋), WANG Yu-min (王育民). Directed Proxy Signature in the Standard Model[J]. 上海交通大学学报(英文版), 2011, 16(6): 663-671. |
[6] | TSO Ray-lin (左瑞麟), KIM Cheonshik, YI Xun (易 训). Certificateless Message Recovery Signatures Providing Girault's Level-3 Security[J]. 上海交通大学学报(英文版), 2011, 16(5): 577-585. |
[7] | CHEN Jian-hong (陈剑洪), LONG Yu (龙 宇), CHEN Ke-fei (陈克非), WANG Yong-. Identity-Based Key-Insulated Proxy Signature Without Random Oracles[J]. 上海交通大学学报(英文版), 2011, 16(5): 557-566. |
[8] | SHEN Zhong-hua (沈忠华), YU Xiu-yuan (于秀源) . Threshold Signature Scheme with Threshold Verification Based on Multivariate Linear Polynomial[J]. 上海交通大学学报(英文版), 2011, 16(5): 551-556. |
[9] | HE Guo-feng 1(何国锋), LI Xiang-xue 2(李祥学), LI Qiang 3(李 强), ZHENG Dong. Efficient Democratic Group Signatures with Threshold Traceability[J]. 上海交通大学学报(英文版), 2011, 16(5): 530-532. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||