Articles

Certificateless Strong Key-Insulated Signature Without Random Oracles

Expand
  • (1. College of Science, Hohai University, Nanjing 210098, China; 2. Department of Computer Science, Shanghai Normal University, Shanghai 200234, China)

Received date: 2011-06-12

  Online published: 2011-10-20

Supported by

the Natioal Natural Science Foundation of China (Nos. 61003215, 61005049,60903178 and 61103183), the Fundamental Research Funds for the Central Universities (No.2010B09614) and the Foundation of Hohai University (No. 2084/409265)

Abstract

Abstract:  It is important to ensure the private key secure in
cryptosystem. To reduce the underlying danger caused by the private key
leakage, Dodis et al. (2003) introduced the notion of key-insulated
security. To handle the private key leakage problems in certificateless
signature schemes, we propose a new certificateless strong key-insulated
signature scheme. Our scheme has two desirable properties. First, its
security can be proved without utilizing the random oracle model. Second, it
solves the key escrow problems in identity-based key-insulated signatures (IBKISs).

Cite this article

WAN Zhong-mei (万中美), Meng Xiang-qin (孟祥芹), HONG Xuan (洪 璇) . Certificateless Strong Key-Insulated Signature Without Random Oracles[J]. Journal of Shanghai Jiaotong University(Science), 2011 , 16(5) : 571 -576 . DOI: 10.1007/s12204-011-1191-7

References

1  Shamir A. Identity-based cryptosystems and signature schemes [C]//  Advances in Cryptology-Crypto 1984. Berlin: Springer-Verlag, 1984: 47-53.
2  Al-Riyami S S, Paterson K G. Certificateless public key cryptography [C] //  Proceedings of 9th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology-Asiacrypt 2003. Berlin: Springer-Verlag, 2003: 452-473.
3  Dodis Y, Katz J, Xu S, et al. Key-insulated public-key cryptosystems [C]//  Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology-Eurocrypt'2002. Berlin: Springer-Verlag, 2002: 65-82.
4  Dodis Y, Katz J, Xu S,  et al. Strong key-insulated signature schemes [C]//  Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography. Berlin: Springer-Verlag, 2003: 130-144.
5  Dodis Y, Yung M. Exposure-resilience for free: The hierarchical ID-based encryption case [C]//  Proceedings of the First International IEEE Security in Storage Workshop. Washington, DC, USA: IEEE, 2002: 45-52.
6  Hanaoka G, Hanaoka Y, Imai H. Parallel key-insulated public key encryption [C]//  Proceedings of the 9th International Conference on Practice and Theory in Public Key Cryptograph: Public Key Cryptography. Berlin: Springer-Verlag, 2006: 105-122.
7  Hanaoka Y, Hanaoka G, Shikata J, et al. Unconditionally secure key-insulated cryptosystems: models, bounds and constructions [C]//  Proceedings of the 4th International Conference on Information and Communications Security. Berlin: Springer-Verlag, 2002: 85-96.
8  Le Z, Ouyang Y, Ford J, et al. A hierarchical key-insulated signature scheme in the CA trust model[C]//  Proceedings of 7th International Conference on Information Security. Berlin: Springer-Verlag, 2004: 280-291.
9  Weng J, Chen K F, Liu S L, et al. Identity-based key-insulated signature with secure key-updates [C]//  Proceedings of the 6th China International Conference on Information Security and Cryptology. Berlin: Springer-Verlag, 2006: 13-26.
10  Weng J, Chen K F, Liu S L,   et al. Identity-based strong key-insulated signature without random oracles [J].  Jounal of Software , 2008,  19(6): 1555-1564.
11  Zhou Y, Cao Z F, Chai Z C. Identity-based key insulated signature [C]//  Proceedings of Second International Conference on Information Security Practice and Experience. Berlin: Springer-Verlag, 2006: 226-234.
12  Bellare M, Palacio A. Protecting against key exposure: strongly key-insulated encryption with optimal threshold [J].  Applicable Algebra in Engineering, Communication and Computing, 2006,  16(6): 379-396.
13  Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited [J].  Journal of the ACM, 2004,  51(4): 557-594.
14  Xiong H, Qin Z, Li F. An improved certificateless signature scheme secure in the standard model [J].  Fundamenta Informaticae, 2008,  88(1): 1-14.
 
 
Options
Outlines

/