کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
461834 696637 2012 10 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Intrusion-resilient identity-based signature: Security definition and construction
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
Intrusion-resilient identity-based signature: Security definition and construction
چکیده انگلیسی

Traditional identity-based signatures depend on the assumption that secret keys are absolutely secure. Once a secret key is exposed, all signatures associated with this secret key have to be reissued. Therefore, limiting the impact of key exposure in identity-based signature is an important task. In this paper, we propose to integrate the intrusion-resilient security into identity-based signatures to deal with their key exposure problem. Compared with forward-secure identity-based signatures and key-insulated identity-based signatures, our proposal can achieve higher security. The proposed scheme satisfies that signatures in any other time periods are secure even after arbitrarily many compromises of base and signer, as long as the compromises do not happen simultaneously. Furthermore, the intruder cannot generate signatures pertaining to previous time periods, even if she compromises base and signer simultaneously to get all their secret information. The scheme enjoys nice average performance. There are no cost parameters including key setup time, key extract time, base (signer) key update time, base (signer) key refresh time, signing time, verifying time, and signature size, public parameter size, base (signer) storage size having complexity more than O(log T) in terms of the total number of time periods T in this scheme. We also give the security definition of intrusion-resilient identity-based signature scheme and prove that our scheme is secure based on this security definition in the random oracle model assuming CDH problem is hard.


► We propose to integrate the intrusion-resilient security into identity-based signatures to deal with their key exposure problem.
► Compared with forward-secure identity-based signatures and key-insulated identity-based signatures, our proposal can achieve higher security.
► The proposed scheme enjoys nice average performance. There are no cost parameters having complexity more than O(logT) in terms of the total number of time periods T.
► We give the security definition of intrusion-resilient identity-based signature scheme and prove that our scheme is secure based on this security definition in the random oracle model.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Systems and Software - Volume 85, Issue 2, February 2012, Pages 382–391
نویسندگان
, , , , ,