上海交通大学学报(英文版) ›› 2011, Vol. 16 ›› Issue (5): 557-566.doi: 10.1007/s12204-011-1187-3

• 论文 • 上一篇    下一篇

Identity-Based Key-Insulated Proxy Signature Without Random Oracles

 CHEN Jian-hong 1,2,3(陈剑洪),    LONG Yu 1(龙   宇),     CHEN Ke-fei 1,3(陈克非),     WANG Yong-tao 1(王永涛)   

  1. (1. Department of Computer Science and Engineering, Shanghai Jiaotong
    University, Shanghai 200240, China; 2. School of Computer Engineering,
    Huaiyin Institute of Technology, Huai'an 223003, Jiangsu, China; 3. Shanghai
    Key Laboratory of Scalable Computing and System, Shanghai Jiaotong
    University, Shanghai 200240, China)
  • 收稿日期:2011-02-10 出版日期:2011-10-29 发布日期:2011-10-20
  • 通讯作者: CHEN Jian-hong (陈剑洪), E-mail:chenjianhong_cis@sjtu.edu.cn
  • 基金资助:

    the National Natural Science Foundation of China of China (Nos. 60970111,60903189 and 60903020), the National High Technology Reaearch and Development Program (863) of Chia (No.2009AA01Z418), and the National Basic Research Program (973) of China (No. 2007CB311201)

Identity-Based Key-Insulated Proxy Signature Without Random Oracles

 CHEN Jian-hong 1,2,3(陈剑洪),    LONG Yu 1(龙   宇),     CHEN Ke-fei 1,3(陈克非),     WANG Yong-tao 1(王永涛)   

  1. (1. Department of Computer Science and Engineering, Shanghai Jiaotong
    University, Shanghai 200240, China; 2. School of Computer Engineering,
    Huaiyin Institute of Technology, Huai'an 223003, Jiangsu, China; 3. Shanghai
    Key Laboratory of Scalable Computing and System, Shanghai Jiaotong
    University, Shanghai 200240, China)
  • Received:2011-02-10 Online:2011-10-29 Published:2011-10-20
  • Contact: CHEN Jian-hong (陈剑洪), E-mail:chenjianhong_cis@sjtu.edu.cn
  • Supported by:

    the National Natural Science Foundation of China of China (Nos. 60970111,60903189 and 60903020), the National High Technology Reaearch and Development Program (863) of Chia (No.2009AA01Z418), and the National Basic Research Program (973) of China (No. 2007CB311201)

摘要: Abstract:  In an identity based proxy signature (IBPS) scheme, a
designated proxy signer can generate the signature on behalf of an original
signer. Traditional IBPS schemes normally rely on the assumption that
private keys are kept perfectly secure. However, due to viruses, worms or
other break-ins allowed by operating-system holes, key exposure seems
inevitable. To minimize the damage caused by key exposure in IBPS, we
propose an identity-based key-insulated proxy signature (IBKIPS) scheme in
the standard model, i.e. without random oracles.

关键词: key-insulated, proxy signature, identity-based, standard
Model

Abstract: Abstract:  In an identity based proxy signature (IBPS) scheme, a
designated proxy signer can generate the signature on behalf of an original
signer. Traditional IBPS schemes normally rely on the assumption that
private keys are kept perfectly secure. However, due to viruses, worms or
other break-ins allowed by operating-system holes, key exposure seems
inevitable. To minimize the damage caused by key exposure in IBPS, we
propose an identity-based key-insulated proxy signature (IBKIPS) scheme in
the standard model, i.e. without random oracles.

Key words: key-insulated, proxy signature, identity-based, standard
Model

中图分类号: