Abstract: It is important to ensure the private key secure in
cryptosystem. To reduce the underlying danger caused by the private key
leakage, Dodis et al. (2003) introduced the notion of key-insulated
security. To handle the private key leakage problems in certificateless
signature schemes, we propose a new certificateless strong key-insulated
signature scheme. Our scheme has two desirable properties. First, its
security can be proved without utilizing the random oracle model. Second, it
solves the key escrow problems in identity-based key-insulated signatures (IBKISs).
WAN Zhong-mei (万中美), Meng Xiang-qin (孟祥芹), HONG Xuan (洪 璇)
. Certificateless Strong Key-Insulated Signature Without Random Oracles[J]. Journal of Shanghai Jiaotong University(Science), 2011
, 16(5)
: 571
-576
.
DOI: 10.1007/s12204-011-1191-7
1 Shamir A. Identity-based cryptosystems and signature schemes [C]// Advances in Cryptology-Crypto 1984. Berlin: Springer-Verlag, 1984: 47-53.
2 Al-Riyami S S, Paterson K G. Certificateless public key cryptography [C] // Proceedings of 9th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology-Asiacrypt 2003. Berlin: Springer-Verlag, 2003: 452-473.
3 Dodis Y, Katz J, Xu S, et al. Key-insulated public-key cryptosystems [C]// Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology-Eurocrypt'2002. Berlin: Springer-Verlag, 2002: 65-82.
4 Dodis Y, Katz J, Xu S, et al. Strong key-insulated signature schemes [C]// Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography. Berlin: Springer-Verlag, 2003: 130-144.
5 Dodis Y, Yung M. Exposure-resilience for free: The hierarchical ID-based encryption case [C]// Proceedings of the First International IEEE Security in Storage Workshop. Washington, DC, USA: IEEE, 2002: 45-52.
6 Hanaoka G, Hanaoka Y, Imai H. Parallel key-insulated public key encryption [C]// Proceedings of the 9th International Conference on Practice and Theory in Public Key Cryptograph: Public Key Cryptography. Berlin: Springer-Verlag, 2006: 105-122.
7 Hanaoka Y, Hanaoka G, Shikata J, et al. Unconditionally secure key-insulated cryptosystems: models, bounds and constructions [C]// Proceedings of the 4th International Conference on Information and Communications Security. Berlin: Springer-Verlag, 2002: 85-96.
8 Le Z, Ouyang Y, Ford J, et al. A hierarchical key-insulated signature scheme in the CA trust model[C]// Proceedings of 7th International Conference on Information Security. Berlin: Springer-Verlag, 2004: 280-291.
9 Weng J, Chen K F, Liu S L, et al. Identity-based key-insulated signature with secure key-updates [C]// Proceedings of the 6th China International Conference on Information Security and Cryptology. Berlin: Springer-Verlag, 2006: 13-26.
10 Weng J, Chen K F, Liu S L, et al. Identity-based strong key-insulated signature without random oracles [J]. Jounal of Software , 2008, 19(6): 1555-1564.
11 Zhou Y, Cao Z F, Chai Z C. Identity-based key insulated signature [C]// Proceedings of Second International Conference on Information Security Practice and Experience. Berlin: Springer-Verlag, 2006: 226-234.
12 Bellare M, Palacio A. Protecting against key exposure: strongly key-insulated encryption with optimal threshold [J]. Applicable Algebra in Engineering, Communication and Computing, 2006, 16(6): 379-396.
13 Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited [J]. Journal of the ACM, 2004, 51(4): 557-594.
14 Xiong H, Qin Z, Li F. An improved certificateless signature scheme secure in the standard model [J]. Fundamenta Informaticae, 2008, 88(1): 1-14.