期刊文献+

标准模型下支持多协助器的强密钥隔离签名方案 被引量:2

Strong Key-Insulated Signature Scheme Supporting Multi-Helpers in the Standard Model
下载PDF
导出
摘要 并行密钥隔离签名方案通常允许2个协助器轮流帮助签名者进行临时私钥更新,然而当2个协助器密钥和任一临时私钥同时发生泄露时,伪造者则可以伪造任意时间段的签名.为了进一步提高签名方案的安全性,提出了一个新的支持n(n>2)个协助器的强密钥隔离签名方案.提出的方案中,即使用户的密钥更新频率增加为原密钥隔离系统的n倍,每个协助器密钥发生泄露的概率仍然与原密钥隔离系统相同,不会增加协助器密钥暴露于不安全环境的概率,从而减小了密钥泄露带来的危害.基于计算Diffie-Hellman假设,在标准模型下证明了方案的安全性. Key-insulated signature is an important technique for protecting the signing secret keys. In key-insulated signature schemes, the security of the rest of the periods are unaffected even if a signing key of a time period is exposed. Parallel key-insulated signature schemes normally allow two helpers to help the signer update temporary private keys to strengthen the security. When two helper keys and any temporary private key are exposed simultaneously, the adversary can forge the correct signature of any time. In order to enhance the security of signature scheme, a new strong key- insulated signature scheme supporting n(n〉2) helper devices is proposed. In the proposed scheme, if the user changes the frequency of updating temporary private keys to n times, the chance of exposing helper key still keeps the same as the original key-insulated system. As a result, it will not increase the chance of exposing the helper keys to insecure environment and will decrease the damage caused by key exposure. Finally, the scheme is proved secure based on the computation Diffie-Hellman assumption in the standard model.
出处 《计算机研究与发展》 EI CSCD 北大核心 2014年第5期1081-1088,共8页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61272425,61202475) 山东省自然科学基金项目(ZR2010FQ019,ZR2009GQ008,ZR2010FQ015) 青岛市科技计划基础研究项目(12-1-4-2-(16)-jch) 信息安全国家重点实验室开放课题项目 华为科技基金项目(YB2013120027)
关键词 多协助器 强密钥隔离方案 双线性配对 标准模型 可证明安全性 multi-helpers strong key-insulated scheme bilinear pairing standard model provablesecurity
  • 相关文献

参考文献10

  • 1Bellare M, Miner S. A forward-secure digital signaturescheme [G]//LNCS 1666. Proc of the 19th Annual IntCryptology Conf. Berlin: Springer, 1990.675448.
  • 2于佳,孔凡玉,程相国,郝蓉,GUO Xiangfa.可证安全的入侵容忍签名方案[J].软件学报,2010,21(9):2352-2366. 被引量:8
  • 3Dodis Y, Katz J, Xu S et al. Key-insulated public-keycryptosystems [G]//LNCS 2332: Proc of the 21st Int Cpnfon the Theory and Applications ofCryptographicTechniques. Berlin: Springer,2002: 65-82.
  • 4Dodis Y, Katz J, Xu S et al. Strong key-insulated signatureschemes [G]//LNCS 2567: Proc of the 6th Int Workshop onPractice and Theory in Public KeyCryptography. Berlin:Springer, 23: 130-144.
  • 5万中美,来学嘉,翁健,刘胜利,龙宇,洪璇.Strong Key-Insulated Signature in the Standard Model[J].Journal of Shanghai Jiaotong university(Science),2010,15(6):657-661. 被引量:2
  • 6Hanaoka G, Hanaoka Y, Imai H. Parallel key-insulatedpublic key encryption [G]//LNCS 3985 s Proc of the 9th IntConf on Theory and Practice in Public-KeyCryptography,Berlin: Springer. 2006: 105-122.
  • 7Libert B Quisquater J J, Yung M. Parallel key-insulatedpublic key encryption without random oracles [G]//LNCS4450: Proc of the 10th Int Conf on Practice and Theory inPublic-Key Cryptography. Berlin:Springer, 2007: 298-314.
  • 8Weng J, Chen K F,Li X X, et al. Parallel key-insulatedsignature framework and construction [J], Journal ofShanghai Jiaotong University (Science). 2008,13(1)s 6-11.
  • 9Canetti R Goldreich O,Halevi S. The random oraclemethodology, revisited [J]. Journal of the ACM, 2004, 51(4): 557-594.
  • 10Ren Y L, Wang S Z. Zhang X P. Practical Parallel key-insulated encryption with multiple helper keys [J].Computersand Mathematics with Applications,2013 65(9): 1403-1412.

二级参考文献16

  • 1WENG J, LIU S L, CHEN K F, et al. Identity-based key-insulated signature without random oracles [C]// Proceedings of International Conference on Computational Intelligence and Security. Berlin: Springer- Verlag, 2007: 470-480.
  • 2WENG J, CHEN K F, LIU S L, et al. Identity- based key-insulated signature with secure key-updates [C]//Proceedings of the 6th China International Conference on Information Security and Cryptology. Berlin: Springer-Verlag, 2006: 13-26.
  • 3DODIS Y, KATZ J, Xu S, et al. Key-insulated publickey cryptosystems [C]// Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology- Eurocrypt'2002. Berlin: Springer-Verlag, 2002: 65-82.
  • 4BELLARE M, PALACIO A. Protecting against key exposure: strongly key-insulated encryption with optimal threshold [J]. Applicable Algebra in Engineering, Communication and Computing, 2006, 16(6): 379-396.
  • 5HANAOKA Y, HANAOKA G, SHIKATA J, et al. Unconditionally secure key-insulated cryptosystems: Models, bounds and constructions [C]// Proceedings of the 4th International Conference on Information and Communications Security. Berlin: Springer-Verlag, 2002: 85- 96.
  • 6DODIS Y, YUNG M. Exposure-resilience for free: The hierarchical ID-based encryption case [C]// Proceedings of the First International IEEE Security in Storage Workshop. Washington, DC, USA: IEEE, 2002: 45-52.
  • 7HANAOKA G, HANAOKA Y, IMAI H. Parallel keyinsulated public key encryption [C]// Proceedings of the 9th International Conference on Practice and Theory in Public Key Cryptograph: Public Key Cryptography. Berlin: Springer-Verlag, 2006: 105-122.
  • 8DODIS Y, KATZ J, XU S, et al. Strong key-insulated signature schemes [C]// Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography:Public Key Cryptography. Berlin: Springer-Verlag, 2003: 130-144.
  • 9LE Z, OUYANG Y, FORD J, et al. A Hierarchical key- insulated signature scheme in the CA trust model [C]//Proceedings of 7th International Conference on Information Security. Berlin: Springer-Verlag, 2004: 280-291.
  • 10OHTAKE G, HANAOKA G, OGAWA K. An efficient strong key-insulated signature scheme and its application [C] // Proceedings of the 5th European PKI Workshop on Public Key Infrastructure: Theory and Practice. Berlin: Springer-Verlag, 2008: 150-165.

共引文献8

同被引文献16

  • 1Bellare M,Miner S.A forward-secure digital signature scheme.Proceedings of the CRYPTO 1999[C].1999.431-448.
  • 2Yu J,Kong F Y,Cheng X G,et al.One forward-secure signature scheme using bilinear maps and its applications[J].Information Sciences,2014,279:60-76.
  • 3Yu J,Hao R,Kong F Y,Cheng X G,et al.Forward-secure identity-based signature:security notions and construction[J].Information Sciences,2011,181(3):648-660.
  • 4Dodis Y,Katz J,Xu S,et al.Strong key-insulated signature schemes.Proceedings of the 6th Int Workshop on Practice and Theory in Public Key Cryptography[C].Berlin:Springer,2003,130-144.
  • 5Yu J,Kong F Y,Cheng X G,Hao R,et al.Intrusion-resilient identity-based signature:security definition and construction[J].Journal of Systems and Software,2012,85(2):382-391.
  • 6Hanaoka G,Hanaoka Y,Imai H.Parallel key-insulated public key encryption.Proceedings of Public Key Cryptography-PKC 2006[C].Berlin:Springer,2006.105-122.
  • 7Boneh D,Gentry C,Lynn B,Shacham H.Aggregate and verifiably encrypted signatures from bilinear maps.Proceedings of Cryptology-Eurocrypt'03[C].Berlin:Springer,2003.416-432.
  • 8Lu S,Ostrovsky R,Sahai A,Shacham H,et al.Sequential aggregate signatures and multi signatures without random oracles.Proceedings of Cryptology-Eurocrypt'06[C].Berlin:Springer,2006.456-485.
  • 9Brogle K,Goldberg Sh,Reyzin L.Sequential aggregate signatures with lazy verification from trapdoor permutations.Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security[C].Berlin:Springer,2012.644-662.
  • 10Lu S,Ostrovsky R,Sahai A,Shacham H,et al.Sequential aggregate signatures,multisignatures,and verifiably encrypted signatures without random oracles[J].Journal of Cryptology,2013,26(2):340-373.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部