Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Introduction to cryptography: principles and applications
Introduction to cryptography: principles and applications
Convertible authenticated encryption scheme
Journal of Systems and Software
Key-Insulated Public Key Cryptosystems
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Strong Key-Insulated Signature Schemes
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Convertible multi-authenticated encryption scheme
Information Sciences: an International Journal
A Convertible Multi-Authenticated Encryption scheme for group communications
Information Sciences: an International Journal
Convertible multi-authenticated encryption scheme with one-way hash function
Computer Communications
Identity-based threshold key-insulated encryption without random oracles
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Identity-Based hierarchical strongly key-insulated encryption and its application
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Identity based key insulated signature
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
A publicly verifiable authenticated encryption scheme with message linkages
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Parallel key-insulated public key encryption
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Elaborating on the merits of convertible multi-authenticated encryption (CMAE) schemes and key-insulated systems, we propose a novel identity-based key-insulated convertible multi-authenticated encryption scheme (IB-KI-CMAE), which can effectively reduce the impact caused by the key exposure. Our scheme allows each user to periodically update his private key while the corresponding public one remains unchanged. Additionally, a group of signers can cooperatively generate an authenticated ciphertext such that only the designated recipient has the ability to decrypt the ciphertext and verify their signature. In case of a later dispute over repudiation, the designated recipient can easily reveal the converted multi-signature for public arbitration. Our scheme can bring crucial benefits to the applications such as joint account and business contract signing. Moreover, in the random oracle model, we also formally prove that the proposed scheme achieves the security requirement of confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) and that of unforgeability against existential forgery under adaptive chosen-message attacks (EF-CMA).