Fuzzy Identity-Based Key-Insulated Cryptosystem
نویسندگان
چکیده
Fuzzy identity-based encryption (FIBE) has found many applications, such as biometric-based encryption, since its notion was firstly proposed by Sahai and Waters [15]. In this paper, we show how to minimize the damage of secret key exposure in FIBE. We introduce a new notion which we call fuzzy identity-based key-insulated encryption (FIBKIE). In FIB-KIE, the secret key associated with an identity is shared between the user and a tamper-proof device. The master key is stored on a tamper-proof device and a temporary secret key used to perform cryptographic operations is stored in an insecure device and updated regularly with the help of a tamper-proof device that stores a master key. We first present the definition and security model of FIB-KIE. Then, we suggest an FIB-KIE scheme, which is provably secure under the proposed
منابع مشابه
A Strong Identity Based Key-Insulated Cryptosystem
Key-insulated cryptosystem was proposed in order to minimize the damage of secret key exposure. In this paper, we propose a strong identity based (ID-based) key-insulated cryptosystem security model, including ID-based key-insulated encryption (IB-KIE) security model and ID-based key-insulated signature (IB-KIS) security model. Based on the security models, provably secure strong IB-KIE and IBK...
متن کاملAuthenticated Key-Insulated Public Key Encryption and Timed-Release Cryptography
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release Public Key cryptography, introduced independently by May and Rivest, Shamir and Wagner. We first formalize the notion of secure timed-release cryptography, and show that, despite several differences in its formulation...
متن کاملTimed-Release and Key-Insulated Public Key Encryption
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release Public Key cryptography, introduced independently by May and Rivest, Shamir and Wagner. We first formalize the notion of secure timed-release public key encryption, and show that, despite several differences in its fo...
متن کاملRemove Key Escrow from The Identity-Based Encryption System
Key escrow is an inherent property in the current proposed Identity-Based Encryption (IBE) systems. However the key escrow is not always a good property for all applications. In this paper, we present a scheme which removes the key escrow from the IBE system proposed by Bonch and Franklin, while at the same time maintaining some important properties of the IBE. We also present some cryptosystem...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کامل