Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








20,133 Hits in 3.8 sec

Identity-based key-insulated aggregate signature scheme

P. Vasudeva Reddy, P.V.S.S.N. Gopal
2017 Journal of King Saud University: Computer and Information Sciences  
To reduce the damage caused by the key exposure problem in aggregate signatures and preserve the benefits of identity-based (ID-based) cryptography, we hereby propose the first key-insulated aggregate  ...  signature scheme in ID-based setting.  ...  This is the first key insulated aggregate signature scheme in ID-based setting.  ... 
doi:10.1016/j.jksuci.2015.09.003 fatcat:hliexgb5cbhk7neym7hc3y3fpm

Identity-Based Strong Key-Insulated Signature Without Random Oracles

Jian WENG
2008 Journal of Software (Chinese)  
Identity-Based strong key-insulated signature without random oracles.  ...  [17] applied the key-insulation mechanism to IBS and proposed the first ID-based key-insulated signature (IBKIS) scheme (ZCC scheme).  ...  key-insulated signature Definition 3.  ... 
doi:10.3724/sp.j.1001.2008.01555 fatcat:bqdpp3muorh2ngr5qqjtxw4s24

Identity-Based Parallel Key-Insulated Signature: Framework and Construction

Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li
2008 Journal of research and practice in information technology  
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC'06 Zhou et al (2006) proposed an ID-based key-insulated signature (IBKIS) scheme.  ...  In this paper, we extend Hanaoka et al (2006) parallel key-insulated mechanism to IDbased signature scenarios, and present an ID-based parallel key-insulated signature (IBPKIS) scheme.  ...  To minimize the damage caused by key-exposure in ID-based signatures, Zhou et al (2006) proposed an ID-based key-insulated signature (IBKIS) scheme.  ... 
dblp:journals/acj/WengLCL08 fatcat:omuxceo7wjb7zlrv4pjzce37nm

Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System

Yanan Chen, Ting Yao, Haiping Ren, Zehao Gan
2022 CMES - Computer Modeling in Engineering & Sciences  
What's more, it can update different corresponding private keys in infinite time periods without changing the identity information of the user as the public key.  ...  Although the leakage of the private key occurs at a certain moment, the forward and backward key will not be attacked. Thus, the purpose of key insulation is implemented.  ...  key-insulated signature [41] in the unidirectional IDPRS [23] , the concrete construction of the unidirectional identity-based PRS scheme with insulated key has been given as follows: • Setup(1 k )  ... 
doi:10.32604/cmes.2022.019589 fatcat:xzt3gjsgovclxaali2tbakdz2e

A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security

2015 KSII Transactions on Internet and Information Systems  
Certificate-based signature (CBS) combines the advantages of both public key-based signature and identity-based signature, while saving from the disadvantages of drawbacks in both PKS and IBS.  ...  To resist the threat of key leakage, we present a pairing-free key insulated CBS scheme by incorporating the idea of key insulated mechanism and CBS.  ...  Security definitions Motivated by the security models for key insulated signature in traditional PKI [15, 16] , ID-based cryptosystems [21, 22] , and certificate-based signature [12] [13] [14] , Li  ... 
doi:10.3837/tiis.2015.03.023 fatcat:t27tsv2ncjfxbivlb463asrnh4

New identity-based key-insulated convertible multi-authenticated encryption scheme

Chien-Lung Hsu, Han-Yu Lin
2011 Journal of Network and Computer Applications  
Elaborating on the merits of convertible multi-authenticated encryption (CMAE) schemes and keyinsulated systems, we propose a novel identity-based key-insulated convertible multi-authenticated encryption  ...  scheme (IB-KI-CMAE), which can effectively reduce the impact caused by the key exposure.  ...  The next year, Zhou et al. (2006) presented an identity-based key-insulated signature (IB-KIS) scheme. In the random oracle model, they also formally proved the security of their scheme.  ... 
doi:10.1016/j.jnca.2011.06.005 fatcat:vhy6wjkehngv7nlebweyqp452y

Attribute-Based Threshold Key-Insulated Signature

2016 Revista Técnica de la Facultad de Ingeniería Universidad del Zulia  
To deal with the signing key exposure problem in attribute-based signature systems, we propose an attribute-based threshold key-insulated signature (ABTKIS) scheme.  ...  It strengthens the security and flexibility of existing attribute-based key-insulated signature schemes. Our scheme is provably secure in the standard model (i.e. without random oracles).  ...  ABS can be applied to attribute based messaging systems and anonymous authentication. The first attribute-based key-insulated signature scheme (ABKIS) was proposed by Chen et al.  ... 
doi:10.21311/001.39.5.48 fatcat:fmrevjlnhjdg5df5mi7gee3tra

Strong Key-Insulated Signature Schemes [chapter]

Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
2002 Lecture Notes in Computer Science  
Finally, we construct strong (N − 1, N)-key-insulated schemes based on any "trapdoor signature scheme" (a notion we introduce here); our resulting construction in fact serves as an identity-based signature  ...  We present here constructions of strong key-insulated signature schemes based on a variety of assumptions.  ...  Finally, we mention that an identity-based signature scheme [28] immediately gives an (N − 1, N)-key-insulated signature scheme (ensuring strong security requires some additional work).  ... 
doi:10.1007/3-540-36288-6_10 fatcat:rvsmqwgy6zgm3cxeocep4rs63u

A Strong Identity Based Key-Insulated Cryptosystem [chapter]

Jin Li, Fangguo Zhang, Yanming Wang
2006 Lecture Notes in Computer Science  
In this paper, we propose a strong identity based (ID-based) key-insulated cryptosystem security model, including ID-based key-insulated encryption (IB-KIE) security model and ID-based key-insulated signature  ...  All the key-insulated encryption and signature schemes in this paper are provably secure in the random oracle model and support random-access key-updates.  ...  In order to decrease the damage of secret key exposure in identity based cryptosystem, a strong ID-based (N − 1, N ) -key-insulated encryption and a strong ID-based (N − 1, N ) -key-insulated signature  ... 
doi:10.1007/11807964_36 fatcat:x5wtpeyjffbyvb64asvymjzqmu

Attribute-Based Parallel Key-Insulated Signature

Jianhong Chen, Kun Yu, Yu Long, Kefei Chen
2015 Cybernetics and Information Technologies  
of an Attribute-Based Parallel Key-Insulated Signature (ABPKIS).  ...  To deal with the key-exposure protection problem in attribute-based signature systems, we extend the parallel key-insulated mechanism to attribute-based signature scenarios, and then introduce the primitive  ...  [1] proposed an Attribute-Based Key-Insulated Signature (ABKIS), which is a crucial technique for protecting signing keys in ABS systems.  ... 
doi:10.1515/cait-2015-0039 fatcat:rdhocgwrareu3kkleubexf5sf4

A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation

Yong-Woon Hwang, Im-Yeong Lee
2021 Computers Materials & Continua  
Aggregate signature methods (e.g., identity-based and certificateless cryptography) have been studied. Both methods pose key escrow and key distribution problems.  ...  In this proposed method, by providing key insulation, security threats that occur when keys are exposed due to physical attacks such as side channels can be solved.  ...  [11] scheme employ identity-based aggregate signatures, but only the Reddy et al. scheme features key insulation.  ... 
doi:10.32604/cmc.2021.018549 fatcat:doh6aszdjnazrkcrzk4zcwwmme

Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

Caixue Zhou, Zhiqiang Zhao, Wan Zhou, Yuan Mei
2017 Security and Communication Networks  
A key-insulated mechanism can resolve the private key exposure problem.  ...  Generalized signcryption (GSC) can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair.  ...  [23] proposed the first identity-based key-insulated signature in 2006. Weng et al. [24] developed an identitybased key-insulated signature in the standard model in the same year.  ... 
doi:10.1155/2017/8405879 fatcat:sfouwhspnvcypozhgv5aitakvq

New Efficient Identity-Based Key-Insulated Multisignature Scheme

Han-Yu Lin, Tzong-Sun Wu, Ming-Lun Lee, Chi-Kuang Yeh
2013 International Journal of Machine Learning and Computing  
Index Terms-Identity-based, key-insulated, multi-signature, key exposure, bilinear pairing.  ...  We propose a new efficient identity-based key-insulted multisignature scheme for facilitating group-oriented applications and mitigating the impact of key exposure.  ...  [19] presented an identity-based key-insulated signature ( Further consider the security of helper which stores the long-term private key, Hanaoka et al.  ... 
doi:10.7763/ijmlc.2013.v3.284 fatcat:phdx4kmnzzaznk7oevawo3xz44

ID-based key-insulated signcryption with equality test in cloud computing

Seth Alornyo, Kingsford Kissi Mireku, Mustapha Adamu Mohammed, Daniel Adu-Gyamfi, Michael Asante
2021 SN Applied Sciences  
In this study, we merge the primitives of parallel key-insulation cryptosystem and signcryption with equality test to construct ID-based parallel key-insulated signcryption with a test for equality (ID-PKSET  ...  AbstractKey-insulated encryption reduces the problem of secret key exposure in hostile setting while signcryption cryptosystem attains the benefits of digitally signing a ciphertext and public key cryptosystem  ...  Moreover, a combination of identity-based scheme with support for key insulation by Hanaoka et al. [8] gave rise to identity based key insulated encryption using a single helper.  ... 
doi:10.1007/s42452-021-04469-9 fatcat:lkjgivehzre5bfrmi35ytvbn34

Provably Secure Key Insulated Attribute Based Signature without Bilinear Pairings for Wireless Communications

Han-shu HONG, Yun-hao XIA, Zhi-xin SUN
2017 DEStech Transactions on Computer Science and Engineering  
To better tackle the above problems and provides a more secure data authentication method in mobile communication systems, in this paper, we firstly propose a key insulated attribute based signature scheme  ...  Attribute based signature (ABS) is a significant cryptographic notion providing secure authentication during data sharing. A signer can sign a message using the private keys he processes.  ...  Ibrahim Elashry et al. in [13] proposed an efficient identity based encryption scheme independent of pairings.  ... 
doi:10.12783/dtcse/wcne2016/5086 fatcat:7ugatdps25dndcd2h66ltwzszm
« Previous Showing results 1 — 15 out of 20,133 results