Articles

An Efficient Threshold Key-Insulated Signature Scheme

Expand
  • (1. Department of Computer Science and Engineering, Shanghai Jiaotong
    University, Shanghai 200240, China;
    2. School of Computer Engineering, Huaiyin Institute of Technology, Huai'an
    223003, Jiangsu, China;
    3. Shanghai Key Laboratory of Scalable Computing and System,
    Shanghai Jiaotong University, Shanghai 200240, China;
    4. Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China)    

Received date: 2010-01-28

  Online published: 2012-01-12

Abstract

To tackle the key-exposure problem in signature settings,
this paper introduces a new cryptographic primitive named threshold key-insulated
signature (TKIS) and proposes a concrete TKIS scheme.For a TKIS system, at
least k out of n helpers are needed to update a user's temporary private key.
On the one hand, even if up to k-1 helpers are compromised in addition to the
exposure of any of temporary private keys, security of the non-exposed
periods is still assured. On the other hand, even if all the n helpers are
compromised, we can still ensure the security of all periods as long as none
of temporary private keys is exposed. Compared with traditional
key-insulated signature (KIS) schemes, the proposed TKIS scheme not only
greatly enhances the security of the system, but also provides flexibility
and efficiency.

Cite this article

CHEN Jian-hong (陈剑洪), LONG Yu (龙 宇), CHEN Ke-fei (陈克非) WANG Yong-tao (王永涛),LI Xiang-xue (李祥学) . An Efficient Threshold Key-Insulated Signature Scheme[J]. Journal of Shanghai Jiaotong University(Science), 2011 , 16(6) : 658 -662 . DOI: 10.1007/s12204-011-1207-3

References

1  Dodis Y, Katz J, Xu S, et al. Key-insulated public-key cryptosystems [C]// Proceedings of EUROCRYPT'02: LNCS   2332. Berlin: Springer-Verlag, 2002: 65-82.

2  Hanaoka G, Hanaoka Y, Imai H. Parallel key-insulated public key encryption [C]//  Proceedings of PKC'06: LNCS   3958. Berlin: Springer-Verlag, 2006: 105-122.

3  Weng J, Liu S, et al. Identity-based threshold key-insulated encryption without random oracles [C]//  Proceedings of CT-RSA'08: LNCS   4964. Berlin, Germany: Springer-Verlag, 2008: 203-220.

4  Dodis Y, Katz J, Xu S, et al. Strong key-insulated signature schemes [C]//  Proceedings of PKC'03: LNCS   2567. Berlin, Germany: Springer-Verlag,  2003: 130-144.

5  Weng J, Chen K, Li X, et al. Parallel key-insulated signature: Framework and construction [J].   Journal of Shanghai Jiaotong University (Science), 2008, 13  (1): 6-11.

6  Waters B. Efficient identity-based encryption without random oracles [C]//  Proceedings of EUROCRYPT'05: LNCS   3494. Berlin, Germany: Springer-Verlag, 2005: 114-127.

7  Boneh D, Franklin M. Identity based encryption from the weil pairing [C]//  Proceedings of CRYPTO'01: LNCS   2139. Berlin, Germany: Springer-Verlag, 2001: 213-229.
Options
Outlines

/