作者
Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li
发表日期
2006
研讨会论文
Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29-December 1, 2006. Proceedings 2
页码范围
13-26
出版商
Springer Berlin Heidelberg
简介
Standard identity-based (ID-based) signature schemes typically rely on the assumption that secret keys are kept perfectly secure. However, with more and more cryptographic primitives are deployed on insecure devices (e.g. mobile devices), key-exposure seems inevitable. This problem is perhaps the most devastating attack on a cryptosystem since it typically means that security is entirely lost. To minimize the damage caused by key-exposure in ID-based signatures scenarios, Zhou et al. [32] applied Dodis et al.’s key-insulation mechanism [12] and proposed an ID-based key-insulated signature (IBKIS) scheme. However, their scheme is not strong key-insulated, i.e, if an adversary compromises the helper key, he can derive all the temporary secret keys and sign messages on behalf the legitimate user. In this paper, we re-formalize the definition and security notions for IBKIS schemes, and then propose a …
引用总数
20062007200820092010201120122013201420152016201720182019202020212022202320241425453772321221
学术搜索中的文章
J Weng, S Liu, K Chen, X Li - Information Security and Cryptology: Second SKLOIS …, 2006