A Method for Detecting the Exposure of a Secret Key in Key-Insulated Scheme
نویسندگان
چکیده
Dodis et al proposed a key-insulated signature scheme in 2003. In the scheme, total lifetime of a certificate is divided to time periods and different secret keys are used for each time period. The master secret key is stored in the physically secure device and is not used for signing directly. The different secret keys are used for signature in each time period and they are refreshed by a computation with the master key. Therefore, the scheme can minimize the damage caused by a secret key’s exposure. However, it can not protect the user from the secret key’s exposure perfectly. We propose a method which can detect even a single illegitimate signature due to the exposure of a secret key in the key-insulated scheme. The method uses the one-time hash chain based on NOVOMODO and the counter. And it requires small modification of traditional PKI. The method can prevent the users from compromising a secret key effectively in the keyinsulated signature scheme.
منابع مشابه
Identity-Based Parallel Key-Insulated Signature: Framework and Construction
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) proposed an ID-based key-insulated signature (IBKIS) scheme. However, their scheme is not strong key-insulated, i.e, if a user’s helper is compromised, the adversary can derive all of this user’s secret keys for any time period. Moreover, in practice, to alleviate the damage in case of key-exposu...
متن کاملOptimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels
Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...
متن کاملAn improved certificateless strong key-insulated signature scheme in the standard model
Exposure of secret keys may be the most devastating attack on a public key cryptographic scheme since such that security is entirely lost. The key-insulated security provides a promising approach to deal with this threat since it can effectively mitigate the damage caused by the secret key exposure. To eliminate the cumbersome certificate management in traditional PKIsupported key-insulated sig...
متن کاملCertificateless Key-Insulated Encryption: Cryptographic Primitive for Achieving Key-Escrow Free and Key-Exposure Resilience
Certificateless encryption (CLE) alleviates the heavy certificate management in traditional public key encryption and the key escrow problem in the ID-based encryption simultaneously. Current CLE schemes assumed that the user’s secret key is absolutely secure. Unfortunately, this assumption is too strong in case the CLE is deployed in the hostile setting and the leakage of secret key is inevita...
متن کاملIdentity-Based Parallel Key-Insulated Signature Without Random Oracles
We extend Hanaoka et al.’s parallel key-insulated mechanism to identity-based signature scenarios, and propose an identity-based parallel key-insulated signature scheme. The proposed scheme enjoys several attractive features: (i) it is provably secure without random oracles; (ii) it is strong key-insulated, and even if one of a user’s helper key and some of his temporary secret keys are exposed...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008