期刊文献+

Identity-Based Key-Insulated Proxy Signature Without Random Oracles

Identity-Based Key-Insulated Proxy Signature Without Random Oracles
原文传递
导出
摘要 In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are kept perfectly secure. However, due to viruses, worms or other break-ins allowed by operating-system holes, key exposure seems inevitable. To minimize the damage caused by key exposure in IBPS, we propose an identity-based key-insulated proxy signature (IBKIPS) scheme in the standard model, i.e. without random oracles. In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are kept perfectly secure. However, due to viruses, worms or other break-ins allowed by operating-system holes, key exposure seems inevitable. To minimize the damage caused by key exposure in IBPS, we propose an identity-based key-insulated proxy signature (IBKIPS) scheme in the standard model, i.e. without random oracles.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期557-566,共10页 上海交通大学学报(英文版)
基金 the National Natural Science Foundation of China (Nos. 60970111, 60903189 and 60903020) the National High Technology Research and Development Program (863) of China (No. 2009AA01Z418) the National Basic Research Program (973) of China (No. 2007CB311201)
关键词 KEY-INSULATED proxy signature IDENTITY-BASED standard model key-insulated, proxy signature, identity-based, standard model
  • 相关文献

参考文献1

二级参考文献10

  • 1F. Hess.Efficient identity based signature schemes based on pairings[].ACM Symposium on Applied Computing (SAC’ ).2002
  • 2F. Zhang,K. Kim.Efficient ID-based blind sig- nature and proxy signature from bilinear pairings[].Proceedings of the th Australasia Conference on Information Security and Privacy (ACISP’).2003
  • 3Y. Dodis,J. Katz,S. Xu,M. Yung.Key-insulated public-key cryptosystems[].Advances in Cryptology (Eurocrypt’ ).2002
  • 4N. Gonzalez-Deleito,O. Markowitch,E. DallOlio.A new key-insulated signature scheme[].International Conference on Information and Communications Se- curity (ICICS’).2004
  • 5J. Weng,K. F. Chen,S. L. Liu,,X. X. Li.Identity- based key-insulated signature with secure key updates[].Information Security and Cryptology (Inscrypt’).
  • 6J. Weng,S. L. Liu,K. F. Chen,C. S. Ma.Iden- tity-based key-insulated signature without random oracles[].Computational Intelligence and Security (CIS’ ).2006
  • 7Mambo M,Usuda K,Okamoto E.Proxy signature: delegation of the power to sign messages[].IEICE Transactions on Fundamentals of Electronic Communications and Computer Science.1996
  • 8Shamir,A.Identity-Based Cryptosystems and Signature Schemes[].Lecture Notes in Computer Science.1984
  • 9K. G. Paterson.ID-based signatures from pairings on elliptic curves[].IEEE Communications Letters.2002
  • 10J C Cha,and J H Cheon.An Identity-based Signature from Gap Diffie-Hellman Groups[].Practice and Theory in Public Key Cryptography- PKC.2003

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部