A Forward-Backward Secure Signature Scheme
نویسندگان
چکیده
The key exposures carry very serious problems, it is regarded a total break down of the system. In order to avoid this undesirable situation, the goal of forward security is to protect against this kind of threat. A protocol is said to provide forward secrecy if compromising long-term secret keys does not compromise past secret keys that were previously established. Bellare and Miner first proposed signatures with forward-security properties [4]. In 2001, Abdalla and Reyzin improved Bellare-Miner’s forward-secure GQ signature schemes with a shorter public key [2]. In 2002, Malkin, Micciancio and Miner construct an efficient forward-secure digital signature scheme. The number of time periods can be used is bounded only by an exponential function of the security parameter [10]. In the same year, Kozlov and Reyzin proposed an efficient Key Update of all known schemes, requiring just a single modular squaring. They claimed that more frequent key update will enhance the signature security [6]. Since then, many works related to forward-secure schemes have been proposed [1, 5-9, 12, 14]. The main concept of the forward-secure signature scheme is that the public key remains fixed, while the secret signing key is updated at regular intervals. Each secret signing key is used for signing messages only during a particular time period. At the end of each time period, a new secret key is produced and the old one is erased. This can be useful to mitigate the damage caused by key exposure without requiring distributions of keys.
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملEfficient Generic Forward-Secure Signatures and Proxy Signatures
We propose a generic method to construct forward-secure signature schemes from standard signature schemes. The proposed construction is more computationally efficient than previously proposed schemes. In particular, the key updating operation in the proposed scheme is orders of magnitude more computationally efficient than previous schemes, making it attractive for a variety of applications, su...
متن کاملConvertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملUniversal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al
Duc et al. proposed a forward-secure blind signature scheme in [1]. They claimed that the scheme is constructed from the provably secure OkamotoGuilou-Quisquater blind signature scheme. But we recently found that their scheme is insecure. In the paper, we show the scheme is universally forgeable by a simple and direct attack.
متن کاملImprovement of a Forward-Secure Multi-Proxy Signature Scheme
This paper shows some insecurities in Xu’s forward secure multi-proxy signature scheme. There are two kinds of attacks on this scheme: (1) anyone can forge some certain messages which to be sign and cannot detect by the signature verifier. (2) This scheme can’t resist the dishonest signer forgery attack by forging its own public key. After that, the paper proposed two new forward-secure multi-p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Inf. Sci. Eng.
دوره 26 شماره
صفحات -
تاریخ انتشار 2010