期刊文献+

IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE 被引量:4

IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE
下载PDF
导出
摘要 In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature scheme since any adversary can sign messages on behalf of the proxy signer. In this paper,we applied Dodis,et al.’s key-insulation mechanism and proposed an Identity-Based (ID-based) Key-Insulated Proxy Signature (IBKIPS) scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also supports unbounded period numbers and random-access key-updates. In proxy signature schemes, the proxy signer B is permitted to produce a signature on behalf of the original signer A. However, exposure of proxy signing keys can be the most devastating attack on a proxy signature scheme since any adversary can sign messages on behalf of the proxy signer. In this paper, we applied Dodis, et al.'s key-insulation mechanism and proposed an Identity-Based (ID-based) Key-Insulated Proxy Signature (IBKIPS) scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also supports unbounded period numbers and random-access key-updates.
出处 《Journal of Electronics(China)》 2009年第6期853-858,共6页 电子科学学刊(英文版)
基金 Supported by the National Natural Science Foundation of China (No. 60573032, 60773092, 90604036, 60873229, 60903178, 60672072, 60832003) Zhejiang Provincial Natural Science Foundation of China (No. Y106505)
关键词 KEY-INSULATED Proxy signature Identity-based signature Key-exposure Bilinear pairings 代理签名 密钥绝缘 签名方案 随机存取 签名者 破坏性 amp 身份证
  • 相关文献

参考文献10

  • 1F. Hess.Efficient identity based signature schemes based on pairings[].ACM Symposium on Applied Computing (SAC’ ).2002
  • 2F. Zhang,K. Kim.Efficient ID-based blind sig- nature and proxy signature from bilinear pairings[].Proceedings of the th Australasia Conference on Information Security and Privacy (ACISP’).2003
  • 3Y. Dodis,J. Katz,S. Xu,M. Yung.Key-insulated public-key cryptosystems[].Advances in Cryptology (Eurocrypt’ ).2002
  • 4N. Gonzalez-Deleito,O. Markowitch,E. DallOlio.A new key-insulated signature scheme[].International Conference on Information and Communications Se- curity (ICICS’).2004
  • 5J. Weng,K. F. Chen,S. L. Liu,,X. X. Li.Identity- based key-insulated signature with secure key updates[].Information Security and Cryptology (Inscrypt’).
  • 6J. Weng,S. L. Liu,K. F. Chen,C. S. Ma.Iden- tity-based key-insulated signature without random oracles[].Computational Intelligence and Security (CIS’ ).2006
  • 7Mambo M,Usuda K,Okamoto E.Proxy signature: delegation of the power to sign messages[].IEICE Transactions on Fundamentals of Electronic Communications and Computer Science.1996
  • 8Shamir,A.Identity-Based Cryptosystems and Signature Schemes[].Lecture Notes in Computer Science.1984
  • 9K. G. Paterson.ID-based signatures from pairings on elliptic curves[].IEEE Communications Letters.2002
  • 10J C Cha,and J H Cheon.An Identity-based Signature from Gap Diffie-Hellman Groups[].Practice and Theory in Public Key Cryptography- PKC.2003

同被引文献17

  • 1Maymounkov P, Mazieres D. A Peer-to-Peer Information System Based on the XOR Metric[C]//Proc. of the 1st International Workshop on Peer-to-Peer Information Systems. [S. 1.]: Springer-Verlag, 2002: 53-65.
  • 2Gheorghe G, Cigno R L, Montresor A. Security and Privacy Issues in P2P Streaming Systems: A Survey[J]. Peer-to-Peer Networking and Applications, 2011, 4(2): 75-91.
  • 3Diffie W, Hellman M. New Directions in Cryptography[J]. 1EEE Transactions on Information Theory, 1976, 22(6): 644-654.
  • 4E1Gamal T. A Public Key Cryptosystem and C Signature Scheme Based on Discrete Logarithms[J]. IEEE Transactions on Information Theory, 1985, 31(4): 469-472.
  • 5Rivest R, Shamir A, Adleman L. A Method for Obtaining Digital Signatures and Public-key Cryptosystems[J]. Commu- nications of the ACM, 1978, 21(2): 120-126.
  • 6Shamir A. Identity-based Cryptosystems and Signature Sche- mes[C]//Proc, of CRYPTO'85. Berlin, Germany: Springer- Verlag, 1985: 47-53.
  • 7Dodis Y, Katz J, Xu Shouhuai, et al. Key-insulated Public Key Cryptosystems[C]//Proc. of EUROCRYPT'02. Amsterdam, Netherlands: Springer-Verlag, 2002: 65-82.
  • 8Dodis Y, Katz J, Xu Shouhuai, et al. Strong Key-insulated Signature Schemes[C]//Proc. of PKC'03. Miami, USA: Springer-Verlag, 2003:130-144.
  • 9Hanaoka Y, Hanaoka G, Shikata J, et al. Identity-based Hierarchical Strongly Key-insulated Encryption and Its Application[C]//Proc. of ASIACRYPT'05. Berlin, Germany: Springer-Verlag, 2005:495-514.
  • 10Zhou Yuan, Cao Zhenfu, Chai Zhenchuan. Identity Based Key Insulated Signature[C]//Proc. of ISPEC'06. Hangzhou, China: Springer-Verlag, 2006: 226-234.

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部