Efficient Intrusion-Resilient Signatures Without Random Oracles
نویسندگان
چکیده
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into distinct periods where private keys are periodically updated while public keys remain fixed. Private keys are stored in both a user and a base; signature operations are performed by the user while the base is involved in periodic updates. Such a system remains secure after arbitrarily many compromises of both modules as long as break-ins are not simultaneous. Besides, when they simultaneously occur within some time period, past periods remain safe. In this work, we propose the first intrusion-resilient signature in the standard model (i.e. without random oracles) which provides both short signatures and at most log-squared private storage in the number of time periods.
منابع مشابه
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to cope with an active adversary who can repeatedly compromise the user’s machine and perform any efficient computation on the entire shared key. However, we assume that the attacker is communication bounded and unable to retriev...
متن کامل(Hierarchical Identity-Based) Threshold Ring Signatures without Random Oracles
We construct the first several efficient threshold ring signatures (TRS) without random oracles. Specializing to a threshold of one, they are the first several efficient ring signatures without random oracles after the only earlier instantiation of Chow, Liu, Wei, and Yuen [22]. Further specializing to a ring of just one user, they are the short (ordinary) signatures without random oracles summ...
متن کاملIntrusion-Resilient Signatures, or Towards Obsoletion of Certificate Revocation
We propose a new notion of intrusion-resilient signature schemes, which generalizes and improves upon both forward-secure [And97, BM99] and key-insulated [DKXY02] signature schemes. Specifically, similarly to the prior notions, time is divided into predefined time periods (e.g., days) so that a signature includes the time period number, changing which invalidates the signature. Also, similarly ...
متن کاملSiBIR: Signer-Base Intrusion-Resilient Signatures
We propose a new notion of signer-base intrusion-resilient (SiBIR) signatures, which generalizes and improves upon both forward-secure [And97, BM99] and key-insulated [DKXY02] signature schemes. Specifically, as in the prior notions, time is divided into predefined time periods (e.g., days); each signature includes the number of the time period in which it was generated; while the public key re...
متن کاملEfficient Ring Signatures Without Random Oracles
We describe the first efficient ring signature scheme secure, without random oracles, basedon standard assumptions. Our ring signatures are based in bilinear groups. For l members ofa ring our signatures consist of 2l + 2 group elements and require 2l + 3 pairings to verify. Weprove our scheme secure in the strongest security model proposed by Bender, Katz, and Morselli:namely, ...
متن کامل