Forward-secure identity-based signature: Security notions and construction

  • Authors:
  • Jia Yu;Rong Hao;Fanyu Kong;Xiangguo Cheng;Jianxi Fan;Yangkui Chen

  • Affiliations:
  • College of Information Engineering, Qingdao University, 266071 Qingdao, China;College of Information Engineering, Qingdao University, 266071 Qingdao, China;Institute of Network Security, Shandong University, 250100 Jinan, China and Key Lab of Cryptographic Technology and Information Security, Ministry of Education, Jinan 250100, China;College of Information Engineering, Qingdao University, 266071 Qingdao, China;School of Computer Science and Technology, Soochow University, Suzhou 215006, China;College of Information Engineering, Qingdao University, 266071 Qingdao, China

  • Venue:
  • Information Sciences: an International Journal
  • Year:
  • 2011

Quantified Score

Hi-index 0.07

Visualization

Abstract

The security of traditional identity-based signatures wholly depends on the security of secret keys. Exposure of secret keys requires reissuing all previously assigned signatures. This limitation becomes more obvious today as key exposure is more common with increasing use of mobile and unprotected devices. Under this background, mitigating the damage of key exposure in identity-based signatures is an important problem. To deal with this problem, we propose to integrate forward security into identity-based signatures. In this paper, we firstly formalize the definition and security notions for forward-secure identity-based signature scheme, and then construct an efficient scheme. All parameters in our scheme have, at most, log-squared complexity in terms of the total number of time periods. The scheme is provably secure without random oracles.