Attribute-Based Threshold Key-Insulated Signature
نویسندگان
چکیده
Key insulation is an important technique to protect private keys. To deal with the signing key exposure problem in attribute-based signature systems, we propose an attribute-based threshold key-insulated signature (ABTKIS) scheme. It strengthens the security and flexibility of existing attribute-based key-insulated signature schemes. Our scheme is provably secure in the standard model (i.e. without random oracles).
منابع مشابه
Threshold attribute based universal designated verifier signature scheme in the standard model
In universal designated verifier signature scheme, signature holder can designate the signature to any desired designated verifier. Only the designated verifier can believe that the signature holder does have a valid publicly verifiable signature. Attribute based encryption is a novel public key primitive in cryptography and attribute based signature can provide a powerful way for users to cont...
متن کاملProvably secure certificate-based key-insulated signature scheme
Certificate-based signature computation is often performed on insecure devices where the signature key is easy to be exposed. To reduce the influence of key exposure, we introduce key-insulated mechanism into certificate-based cryptography and formalize the notion and security model of the certificate-based key-insulated signature scheme. We then present a certificate-based key-insulated signat...
متن کاملSolutions to Key Exposure Problem in Ring Signature
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we propose the first forward secure ring signature scheme and the first key-insulated ring signature schemes. Both constructions allow a (t, n)-threshold setting. That is, even t secret keys are compromised, the validity of all forward secure ring signatures generated in the past is still preserved...
متن کاملIdentity-Based Strong Key-Insulated Signature Without Random Oracles
It is a worthwhile challenge to deal with the key-exposure problem in identity-based signatures. To deal with this problem, this paper adopts Dodis, et al.’s key-insulation mechanism to identity-based signature scenarios, and proposes an identity-based key-insulated signature scheme. The proposed scheme enjoys two attractive features: (i) it is strong key-insulated; (ii) it is provably secure w...
متن کاملStrong Key-Insulated Signature Schemes
Digital signing is at the heart of Internet based transactions and e-commerce. In this global communication environment, signature computation will be frequently performed on a relatively insecure device (e.g., a mobile phone) that cannot be trusted to completely (and at all times) maintain the secrecy of the private key. Loss of private keys has a devastating effect on digital signature scheme...
متن کامل