Full Text:   <3335>

CLC number: TP311

On-line Access: 2024-08-27

Received: 2023-10-17

Revision Accepted: 2024-05-08

Crosschecked: 2009-08-14

Cited: 8

Clicked: 5754

Citations:  Bibtex RefMan EndNote GB/T7714

-   Go to

Article info.
1. Reference List
Open peer comments

Journal of Zhejiang University SCIENCE A 2009 Vol.10 No.12 P.1790-1800

http://doi.org/10.1631/jzus.A0820714


Certificateless key-insulated signature without random oracles


Author(s):  Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG

Affiliation(s):  Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China; more

Corresponding email(s):   wanmei@sjtu.edu.cn

Key Words:  Key-insulated, Key leakage, Certificateless, Bilinear map


Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG. Certificateless key-insulated signature without random oracles[J]. Journal of Zhejiang University Science A, 2009, 10(12): 1790-1800.

@article{title="Certificateless key-insulated signature without random oracles",
author="Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG",
journal="Journal of Zhejiang University Science A",
volume="10",
number="12",
pages="1790-1800",
year="2009",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.A0820714"
}

%0 Journal Article
%T Certificateless key-insulated signature without random oracles
%A Zhong-mei WAN
%A Xue-jia LAI
%A Jian WENG
%A Sheng-li LIU
%A Yu LONG
%A Xuan HONG
%J Journal of Zhejiang University SCIENCE A
%V 10
%N 12
%P 1790-1800
%@ 1673-565X
%D 2009
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.A0820714

TY - JOUR
T1 - Certificateless key-insulated signature without random oracles
A1 - Zhong-mei WAN
A1 - Xue-jia LAI
A1 - Jian WENG
A1 - Sheng-li LIU
A1 - Yu LONG
A1 - Xuan HONG
J0 - Journal of Zhejiang University Science A
VL - 10
IS - 12
SP - 1790
EP - 1800
%@ 1673-565X
Y1 - 2009
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.A0820714


Abstract: 
Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signature scheme. To handle issues concerning the private key leakage in certificateless signature schemes, we devise the first certificateless key-insulated signature scheme. Our scheme applies the key-insulated mechanism to certificateless cryptography, one with neither certificate nor key escrow. We incorporate Waters (2005)’s signature scheme, Paterson and Schuldt (2006)’s identity-based signature scheme, and Liu et al.(2007)’s certificateless signature scheme to obtain a certificateless key-insulated signature scheme. Our scheme has two desirable properties. First, its security can be proved under the non-pairing-based generalized bilinear Diffie-Hellman (NGBDH) conjecture, without utilizing the random oracle model; second, it solves the key escrow problem in identity-based key-insulated signatures.

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1] Al-Riyami, S.S., Paterson, K.G., 2003. Certificateless public key cryptography. LNCS, 2894:452-473.

[2] Bellare, M., Palacio, A., 2006. Protecting against key exposure: strongly key insulated encryption with optimal threshold. LNCS, 16(6):379-396.

[3] Canetti, R., Goldreich, O., Halevi, S., 2004. The random oracle methodology, revisited. J. ACM, 51(4):557-594.

[4] Cheon, J.H., Hopper, N., Kim, Y., Osipkov, I., 2006. Timed-release and key-insulated public key encryption. LNCS, 4107:191-205.

[5] Dodis, Y., Yung, M., 2002. Exposure-resilience for Free: The Hierarchical ID-based Encryption Case. Proc. IEEE Security in Storage Workshop, p.45-52.

[6] Dodis, Y., Katz, J., Xu, S., Yung, M., 2002. Key-insulated public-key cryptosystems. LNCS, 2332:65-82.

[7] Dodis, Y., Katz, J., Xu, S., Yung, M., 2003. Strong key-insulated signature schemes. LNCS, 2567:130-144.

[8] González-Deleito, N., Markowitch, O., Dall'Olio, E., 2004. A new key-insulated signature scheme. LNCS, 3269:465-479.

[9] Gorantla, M., Gangishetti, R., Das, M., Saxena, A., 2005. An Effective Certificateless Signature Scheme Based on Bilinear Pairings. Proc. 3rd Int. Workshop on Security in Information Systems, p.31-39.

[10] Hanaoka, G., Hanaoka, Y., Imai, H., 2006. Parallel key-insulated public key encryption. LNCS, 3958:105-122.

[11] Hanaoka, Y., Hanaoka, G., Shikata, J., Imai, H., 2002. Unconditionally secure key insulated cryptosystems: models, bounds and constructions. LNCS, 2513:85-96.

[12] Hu, B., Wong, D., Zhang, Z., Deng, X., 2006. Key replacement attack against a generic construction of certificateless signature. LNCS, 4058:235-246.

[13] Huang, X., Susilo, W., Mu, Y., Zhang, F., 2005. On the security of certificateless signature schemes from Asiacrypt 2003. LNCS, 3810:13-25.

[14] Le, Z., Ouyang, Y., Ford, J., Makedon, F., 2004. A hierarchical key-insulated signature scheme in the CA trust model. LNCS, 3225:280-291.

[15] Liu, J.K., Au, M.H., Susilo, W., 2007. Self-generated-certificate Public Key Cryptography and Certificateless Signature/Encryption Scheme in the Standard Model. ACM Symp. on Information, Computer and Communications Security, p.273-283.

[16] Lysyanskaya, A., 2002. Unique signatures and verifiable random functions from the DH-DDH separation. LNCS, 2442:597-612.

[17] Paterson, K., Schuldt, J., 2006. Efficient identity-based signatures secure in the standard model. LNCS, 4058:207-222.

[18] Shamir, A., 1984. Identity-based cryptosystems and signature schemes. LNCS, 196:47-53.

[19] Waters, B., 2005. Efficient identity-based encryption without random oracles. LNCS, 3494:114-127.

[20] Weng, J., Chen, K.F., Liu, S.L., Li, X.X., 2006. Identity-based key-insulated signature with secure key-updates. LNCS, 4318:13-26.

[21] Weng, J., Liu, S.L., Chen, K.F., Ma, C.S., 2007. Identity-based key-insulated signature without random oracles. LNAI, 4456:470-480.

[22] Yum, D.H., Lee, P.J., 2004. Generic construction of certificateless signature. LNCS, 3108:200-211.

[23] Zhang, Z.F., Wong, D.S., Xu, J., Feng, D.G., 2006. Certificateless public-key signature: security model and efficient construction. LNCS, 3989:293-308.

[24] Zhou, Y., Cao, Z., Chai, Z., 2006. Identity-based key insulated signature. LNCS, 3903:226-234.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE