CLC number: TP311
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2009-08-14
Cited: 8
Clicked: 5754
Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG. Certificateless key-insulated signature without random oracles[J]. Journal of Zhejiang University Science A, 2009, 10(12): 1790-1800.
@article{title="Certificateless key-insulated signature without random oracles",
author="Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG",
journal="Journal of Zhejiang University Science A",
volume="10",
number="12",
pages="1790-1800",
year="2009",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.A0820714"
}
%0 Journal Article
%T Certificateless key-insulated signature without random oracles
%A Zhong-mei WAN
%A Xue-jia LAI
%A Jian WENG
%A Sheng-li LIU
%A Yu LONG
%A Xuan HONG
%J Journal of Zhejiang University SCIENCE A
%V 10
%N 12
%P 1790-1800
%@ 1673-565X
%D 2009
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.A0820714
TY - JOUR
T1 - Certificateless key-insulated signature without random oracles
A1 - Zhong-mei WAN
A1 - Xue-jia LAI
A1 - Jian WENG
A1 - Sheng-li LIU
A1 - Yu LONG
A1 - Xuan HONG
J0 - Journal of Zhejiang University Science A
VL - 10
IS - 12
SP - 1790
EP - 1800
%@ 1673-565X
Y1 - 2009
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.A0820714
Abstract: Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signature scheme. To handle issues concerning the private key leakage in certificateless signature schemes, we devise the first certificateless key-insulated signature scheme. Our scheme applies the key-insulated mechanism to certificateless cryptography, one with neither certificate nor key escrow. We incorporate Waters (2005)’s signature scheme, Paterson and Schuldt (2006)’s identity-based signature scheme, and Liu et al.(2007)’s certificateless signature scheme to obtain a certificateless key-insulated signature scheme. Our scheme has two desirable properties. First, its security can be proved under the non-pairing-based generalized bilinear Diffie-Hellman (NGBDH) conjecture, without utilizing the random oracle model; second, it solves the key escrow problem in identity-based key-insulated signatures.
[1] Al-Riyami, S.S., Paterson, K.G., 2003. Certificateless public key cryptography. LNCS, 2894:452-473.
[2] Bellare, M., Palacio, A., 2006. Protecting against key exposure: strongly key insulated encryption with optimal threshold. LNCS, 16(6):379-396.
[3] Canetti, R., Goldreich, O., Halevi, S., 2004. The random oracle methodology, revisited. J. ACM, 51(4):557-594.
[4] Cheon, J.H., Hopper, N., Kim, Y., Osipkov, I., 2006. Timed-release and key-insulated public key encryption. LNCS, 4107:191-205.
[5] Dodis, Y., Yung, M., 2002. Exposure-resilience for Free: The Hierarchical ID-based Encryption Case. Proc. IEEE Security in Storage Workshop, p.45-52.
[6] Dodis, Y., Katz, J., Xu, S., Yung, M., 2002. Key-insulated public-key cryptosystems. LNCS, 2332:65-82.
[7] Dodis, Y., Katz, J., Xu, S., Yung, M., 2003. Strong key-insulated signature schemes. LNCS, 2567:130-144.
[8] González-Deleito, N., Markowitch, O., Dall'Olio, E., 2004. A new key-insulated signature scheme. LNCS, 3269:465-479.
[9] Gorantla, M., Gangishetti, R., Das, M., Saxena, A., 2005. An Effective Certificateless Signature Scheme Based on Bilinear Pairings. Proc. 3rd Int. Workshop on Security in Information Systems, p.31-39.
[10] Hanaoka, G., Hanaoka, Y., Imai, H., 2006. Parallel key-insulated public key encryption. LNCS, 3958:105-122.
[11] Hanaoka, Y., Hanaoka, G., Shikata, J., Imai, H., 2002. Unconditionally secure key insulated cryptosystems: models, bounds and constructions. LNCS, 2513:85-96.
[12] Hu, B., Wong, D., Zhang, Z., Deng, X., 2006. Key replacement attack against a generic construction of certificateless signature. LNCS, 4058:235-246.
[13] Huang, X., Susilo, W., Mu, Y., Zhang, F., 2005. On the security of certificateless signature schemes from Asiacrypt 2003. LNCS, 3810:13-25.
[14] Le, Z., Ouyang, Y., Ford, J., Makedon, F., 2004. A hierarchical key-insulated signature scheme in the CA trust model. LNCS, 3225:280-291.
[15] Liu, J.K., Au, M.H., Susilo, W., 2007. Self-generated-certificate Public Key Cryptography and Certificateless Signature/Encryption Scheme in the Standard Model. ACM Symp. on Information, Computer and Communications Security, p.273-283.
[16] Lysyanskaya, A., 2002. Unique signatures and verifiable random functions from the DH-DDH separation. LNCS, 2442:597-612.
[17] Paterson, K., Schuldt, J., 2006. Efficient identity-based signatures secure in the standard model. LNCS, 4058:207-222.
[18] Shamir, A., 1984. Identity-based cryptosystems and signature schemes. LNCS, 196:47-53.
[19] Waters, B., 2005. Efficient identity-based encryption without random oracles. LNCS, 3494:114-127.
[20] Weng, J., Chen, K.F., Liu, S.L., Li, X.X., 2006. Identity-based key-insulated signature with secure key-updates. LNCS, 4318:13-26.
[21] Weng, J., Liu, S.L., Chen, K.F., Ma, C.S., 2007. Identity-based key-insulated signature without random oracles. LNAI, 4456:470-480.
[22] Yum, D.H., Lee, P.J., 2004. Generic construction of certificateless signature. LNCS, 3108:200-211.
[23] Zhang, Z.F., Wong, D.S., Xu, J., Feng, D.G., 2006. Certificateless public-key signature: security model and efficient construction. LNCS, 3989:293-308.
[24] Zhou, Y., Cao, Z., Chai, Z., 2006. Identity-based key insulated signature. LNCS, 3903:226-234.
Open peer comments: Debate/Discuss/Question/Opinion
<1>