Identity-Based Key-Insulated Signature Without Random Oracles

  • Authors:
  • Jian Weng;Shengli Liu;Kefei Chen;Changshe Ma

  • Affiliations:
  • Dept. of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China and School of Computer, South China Normal University, Guangzhou 510631, China;Dept. of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China and Key Laboratory of CNIS, Xidian University, Xian 710071, China;Dept. of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China;School of Computer, South China Normal University, Guangzhou 510631, China

  • Venue:
  • Computational Intelligence and Security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Traditional identity-based signature schemes typically rely on the assumption that secret keys are kept perfectly secure. However, with more and more cryptographic primitives are deployed on insecure devices such as mobile devices, key-exposure seems inevitable. No matter how strong the identity-based signature scheme is, once the secret key is exposed, its security is entirely lost. Therefore, how to deal with this problem in identity-based signatures is a worthwhile challenge. In this paper, applying Dodis et al.'s key-insulation mechanism, we propose a new ID-based key-insulated signature scheme. What makes our scheme attractive is that it is provably secure without random oracles.