Abstract
To reduce the influence of key exposure, we introduce key-insulated into certificate-based cryptography and formalize the notion and security model of the certificate-based key-insulated signature scheme. We then present a certificate-based key-insulated signature scheme, which is proven to be existentially unforgeable against adaptive chosen message attacks in the random oracle model.
This work is supported by the National Natural Science Foundation of China (61272542, 61103183, 61103184), the Fundamental Research Funds for the Central Universities (2009B21114, 2010B07114), the Six Talent Peaks Program of Jiangsu Province of China (2009182) and Program for New Century Excellent Talents in Hohai University.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)
Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the Security of Certificateless Signature Schemes from Asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 13–25. Springer, Heidelberg (2005)
Li, J.G., Huang, X.Y., Mu, Y., Wu, W.: Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme. Journal of Communications and Networks 10(1), 10–17 (2008)
Gentry, C.: Certificate-Based Encryption and the Certificate Revocation Problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)
Kang, B.G., Park, J.H., Hahn, S.G.: A Certificate-Based Signature Scheme. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 99–111. Springer, Heidelberg (2004)
Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Certificate-Based Signature: Security Model and Efficient Construction. In: López, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 110–125. Springer, Heidelberg (2007)
Wu, W., Mu, Y., Susilo, W., Huang, X.Y.: Certificate-Based Signatures Revisited. Journal of Universal Computer Science 15(8), 1659–1684 (2009)
Liu, J.K., Baek, J., Susilo, W., Zhou, J.: Certificate-Based Signature Schemes without Pairings or Random Oracles. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 285–297. Springer, Heidelberg (2008)
Zhang, J.: On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 47–58. Springer, Heidelberg (2009)
Li, J.G., Huang, X.Y., Mu, Y., Susilo, W., Wu, Q.H.: Constructions of Certificate-Based Signature Secure against Key Replacement Attacks. Journal of Computer Security 18(3), 421–449 (2010)
Li, J.G., Huang, X.Y., Zhang, Y.C., Xu, L.Z.: An Efficient Short Certificate-Based Signature Scheme. Journal of Systems and Software 85(2), 314–322 (2012)
Li, J.G., Huang, X.Y., Hong, M.X., Zhang, Y.C.: Certificate-Based Signcryption with Enhanced Security Features. Computers and Mathematics with Applications (accepted, 2012), http://dx.doi.org/10.1016/j.camwa.2012.01.006
Anderson, R.: Invited Lecture. In: Proceedings of the 4th ACM Computer and Communications Security (1997)
Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-Insulated Public Key Cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65–82. Springer, Heidelberg (2002)
Dodis, Y., Katz, J., Xu, S., Yung, M.: Strong Key-Insulated Signature Schemes. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 130–144. Springer, Heidelberg (2002)
Zhou, Y., Cao, Z., Chai, Z.: Identity Based Key Insulated Signature. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds.) ISPEC 2006. LNCS, vol. 3903, pp. 226–234. Springer, Heidelberg (2006)
Weng, J., Liu, S., Chen, K., Li, X.: Identity-Based Key-Insulated Signature with Secure Key-Updates. In: Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. LNCS, vol. 4318, pp. 13–26. Springer, Heidelberg (2006)
Weng, J., Chen, K.F., Liu, S.L., et al.: Identity-Based Strong Key-Insulated Signature without Random Oracles. Jounal of Software 19(6), 1555–1564 (2008)
Wan, Z., Lai, X., Weng, J., Liu, S., Long, Y., Hong, X.: Certificateless Key-Insulated Signature without Random Oracles. Journal of Zhejiang University Science A 10(12), 1790–1800 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Du, H., Li, J., Zhang, Y., Li, T., Zhang, Y. (2012). Certificate-Based Key-Insulated Signature. In: Xiang, Y., Pathan, M., Tao, X., Wang, H. (eds) Data and Knowledge Engineering. ICDKE 2012. Lecture Notes in Computer Science, vol 7696. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34679-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-34679-8_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34678-1
Online ISBN: 978-3-642-34679-8
eBook Packages: Computer ScienceComputer Science (R0)