An Efficient Threshold Key-Insulated Signature Scheme  

An Efficient Threshold Key-Insulated Signature Scheme

在线阅读下载全文

作  者:陈剑洪 龙宇 陈克非 王永涛 李祥学 

机构地区:[1]Department of Computer Science and Engineering,Shanghai Jiaotong University [2]School of Computer Engineering,Huaiyin Institute of Technology [3]Shanghai Key Laboratory of Scalable Computing and System,Shanghai Jiaotong University [4]Department of Computer Science and Technology,East China Normal University

出  处:《Journal of Shanghai Jiaotong university(Science)》2011年第6期658-662,共5页上海交通大学学报(英文版)

基  金:the National Natural Science Foundation of China (Nos.60970111,60903189 and 60903020);the National High Technology Research and Development Program (863) of China (No.2009AA01Z418);the National Basic Research Program (973) of China(No.2007CB311201)

摘  要:To tackle the key-exposure problem in signature settings,this paper introduces a new cryptographic primitive named threshold key-insulated signature(TKIS) and proposes a concrete TKIS scheme.For a TKIS system,at least k out of n helpers are needed to update a user's temporary private key.On the one hand,even if up to k 1 helpers are compromised in addition to the exposure of any of temporary private keys,security of the non-exposed periods is still assured.On the other hand,even if all the n helpers are compromised,we can still ensure the security of all periods as long as none of temporary private keys is exposed.Compared with traditional key-insulated signature(KIS) schemes,the proposed TKIS scheme not only greatly enhances the security of the system,but also provides flexibility and efficiency.To tackle the key-exposure problem in signature settings, this paper introduces a new cryptographic primitive named threshold key-insulated signature (TKIS) and proposes a concrete TKIS scheme. For a TKIS system, at least k out of n helpers are needed to update a user's temporary private key. On the one hand, even if up to k-1 helpers are compromised in addition to the exposure of any of temporary private keys, security of the non-exposed periods is still assured. On the other hand, even if all the n helpers are compromised, we can still ensure the security of all periods as long as none of temporary private keys is exposed. Compared with traditional key-insulated signature (KIS) schemes, the proposed TKIS scheme not only greatly enhances the security of the system, but also provides flexibility and efficiency.

关 键 词:threshold key-insulation SIGNATURE random oracle model 

分 类 号:TN918[电子电信—通信与信息系统] TP301[电子电信—信息与通信工程]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象