Identity-Based Parallel Key-Insulated Signature: Framework and Construction

نویسندگان

  • Jian Weng
  • Shengli Liu
  • Kefei Chen
  • Xiangxue Li
چکیده

To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) proposed an ID-based key-insulated signature (IBKIS) scheme. However, their scheme is not strong key-insulated, i.e, if a user’s helper is compromised, the adversary can derive all of this user’s secret keys for any time period. Moreover, in practice, to alleviate the damage in case of key-exposure, secret keys in IBKIS schemes have to be updated at very short intervals, which will increase the risk of helper key-exposure. It is important to note that even for an IBKIS scheme with strong key-insulated security, once a user’s helper and one of his secret keys are both compromised, the adversary can also derive all of this user’s secret keys for any time period. Is it possible to allow frequent key-updates without increasing the risk of helper key-exposure in IBKIS systems? In this paper, we extend Hanaoka et al (2006) parallel key-insulated mechanism to IDbased signature scenarios, and present an ID-based parallel key-insulated signature (IBPKIS) scheme. Compared with Zhou et al (2006) IBKIS scheme, our scheme enjoys three attractive features: (i) it is strong key-insulated; (ii) it can allow frequent key-updates without increasing the risk of helper key-exposure, and over all, enhances the security of the system; (iii) even if one of a user’s helpers and some of his secret keys are both exposed, it is impossible for an adversary to derive all of this user’s secret keys.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity-Based Parallel Key-Insulated Signature Without Random Oracles

We extend Hanaoka et al.’s parallel key-insulated mechanism to identity-based signature scenarios, and propose an identity-based parallel key-insulated signature scheme. The proposed scheme enjoys several attractive features: (i) it is provably secure without random oracles; (ii) it is strong key-insulated, and even if one of a user’s helper key and some of his temporary secret keys are exposed...

متن کامل

Identity-Based Strong Key-Insulated Signature Without Random Oracles

It is a worthwhile challenge to deal with the key-exposure problem in identity-based signatures. To deal with this problem, this paper adopts Dodis, et al.’s key-insulation mechanism to identity-based signature scenarios, and proposes an identity-based key-insulated signature scheme. The proposed scheme enjoys two attractive features: (i) it is strong key-insulated; (ii) it is provably secure w...

متن کامل

Parallel Key-Insulated Public Key Encryption Without Random Oracles

Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently introduced the idea of parallel key-insulated encryption (PKIE) where distinct physically-secure devices (called helpers) are independently used in key updates. Their motivation was to reduce the risk of exposure for helpers by ...

متن کامل

Strong Key - Insulated Signature Schemes by

Signature computation is frequently performed on insecure devices — e.g., mobile phones — operating in an environment where the private (signing) key is likely to be exposed. Strong keyinsulated signature schemes are one way to mitigate the damage done when this occurs. In the keyinsulated model [6], the secret key stored on an insecure device is refreshed at discrete time periods via interacti...

متن کامل

Strong Key-Insulated Signature Schemes

Digital signing is at the heart of Internet based transactions and e-commerce. In this global communication environment, signature computation will be frequently performed on a relatively insecure device (e.g., a mobile phone) that cannot be trusted to completely (and at all times) maintain the secrecy of the private key. Loss of private keys has a devastating effect on digital signature scheme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Research and Practice in Information Technology

دوره 40  شماره 

صفحات  -

تاریخ انتشار 2008