Identity-based key-insulated aggregate signature scheme

Abstract Private key exposure can be the most devastating attack on cryptographic schemes; as such exposure leads to the breakage of security of the scheme as a whole. In the real world scenario, this problem is perhaps the biggest threat to cryptography. The threat is increasing with users operating on low computational devices (e.g. mobile devices) which hold the corresponding private key for generating signatures. To reduce the damage caused by the key exposure problem in aggregate signatures and preserve the benefits of identity-based (ID-based) cryptography, we hereby propose the first key-insulated aggregate signature scheme in ID-based setting. In this scheme the leakage of temporary private keys will not compromise the security of all the remaining time periods. The security of our scheme is proven secure in the random oracle paradigm with the assumption that the Computational Diffie–Hellman (CDH) problem is intractable. The proposed scheme allows an efficient verification with constant signature size, independent of the number of signers.

[1]  Nicolás González-Deleito,et al.  A New Key-Insulated Signature Scheme , 2004, ICICS.

[2]  Yuh-Min Tseng,et al.  ID-based key-insulated signature scheme with batch verifications and its novel application , 2012 .

[3]  Jian Weng,et al.  Identity-Based Key-Insulated Signature Without Random Oracles , 2006, 2006 International Conference on Computational Intelligence and Security.

[4]  Dengguo Feng,et al.  ID-Based Aggregate Signatures from Bilinear Pairings , 2005, CANS.

[5]  Zhongmei Wan A New Identity-Based Parallel Key-Insulated Signature Scheme without Random Oracles , 2011, 2011 Fourth International Symposium on Computational Intelligence and Design.

[6]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[7]  P. V. S. S. N. Gopal,et al.  New identity based signature scheme using bilinear pairings over elliptic curves , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[8]  Jin Li,et al.  A Strong Identity Based Key-Insulated Cryptosystem , 2006, EUC Workshops.

[9]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[10]  Hui-yan Chen,et al.  Practical identity-based aggregate signature from bilinear maps , 2008 .

[11]  Jian Weng,et al.  Identity-Based Key-Insulated Signature with Secure Key-Updates , 2006, Inscrypt.

[12]  Shouhuai Xu,et al.  Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.

[13]  Kefei Chen,et al.  An efficient threshold key-insulated signature scheme , 2011 .

[14]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[15]  Yuan Zhou,et al.  Identity Based Key Insulated Signature , 2006, ISPEC.

[16]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[17]  Jia Yu,et al.  Key-insulated aggregate signature , 2014, Frontiers of Computer Science.

[18]  Yu-Fang Chung,et al.  ID-based digital signature scheme on the elliptic curve cryptosystem , 2007, Comput. Stand. Interfaces.

[19]  Shouhuai Xu,et al.  Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.

[20]  He Debiao,et al.  An ID-based proxy signature schemes without bilinear pairings , 2011 .

[21]  Ming Xiao,et al.  Dimethyl Sulfoxide Damages Mitochondrial Integrity and Membrane Potential in Cultured Astrocytes , 2014, PloS one.

[22]  Craig Gentry,et al.  Identity-Based Aggregate Signatures , 2006, Public Key Cryptography.

[23]  Bok-Min Goi,et al.  Java Implementation for Pairing-Based Cryptosystems , 2010, ICCSA.

[24]  Paulo S. L. M. Barreto,et al.  Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.

[25]  Kenneth G. Paterson,et al.  ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..

[26]  Kefei Chen,et al.  Attribute-based key-insulated signature and its applications , 2014, Inf. Sci..

[27]  Xiaoni Du,et al.  A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..

[28]  Wenjing Lou,et al.  On Broadcast Authentication in Wireless Sensor Networks , 2007 .

[29]  Xuefeng Zheng,et al.  An Identity Based Aggregate Signature from Pairings , 2011, J. Networks.

[30]  Yumin Yuan,et al.  Efficient Unrestricted Identity-Based Aggregate Signature Scheme , 2014, PloS one.