Key-insulated aggregate signature

In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the definition and the security model of the key-insulated aggregate signature. We also construct a concrete key-insulated aggregate signature scheme that meets our definition. Our scheme has the properties of efficient verification and short signature length. We prove the security of our scheme in the random oracle model under the computation Diffie-Hellman assumption.

[1]  Han-Yu Lin,et al.  New Efficient Identity-Based Key-Insulated Multisignature Scheme , 2013 .

[2]  Rong Hao,et al.  Intrusion-resilient identity-based signature: Security definition and construction , 2012, J. Syst. Softw..

[3]  Rong Hao,et al.  Forward-Secure Identity-Based Public-Key Encryption without Random Oracles , 2011, Fundam. Informaticae.

[4]  Yu,et al.  Identity-based threshold key-insulated signature , 2012 .

[5]  Chunxiang Xu,et al.  New forward-secure signature schemes with untrusted update , 2013, Frontiers of Computer Science.

[6]  Sharon Goldberg,et al.  Sequential aggregate signatures with lazy verification from trapdoor permutations , 2014, Inf. Comput..

[7]  Shouhuai Xu,et al.  Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.

[8]  Brent Waters,et al.  Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures , 2013, CRYPTO.

[9]  Shouhuai Xu,et al.  Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software , 2012, ASIACCS '12.

[10]  Jian Weng,et al.  Strong key-insulated signature in the standard model , 2010 .

[11]  Yuan Zhou,et al.  Identity Based Key Insulated Signature , 2006, ISPEC.

[12]  Rong Hao,et al.  Forward-secure identity-based signature: Security notions and construction , 2011, Inf. Sci..

[13]  Yuh-Min Tseng,et al.  ID-based key-insulated signature scheme with batch verifications and its novel application , 2012 .

[14]  Claudio Soriente,et al.  Intrusion-resilient integrity in data-centric unattended WSNs , 2011, Pervasive Mob. Comput..

[15]  Edwin Hsing-Mean Sha,et al.  Trust prediction and trust-based source routing in mobile ad hoc networks , 2013, Ad Hoc Networks.

[16]  Jian Weng,et al.  Parallel key-insulated signature: Framework and construction , 2008 .

[17]  Rafail Ostrovsky,et al.  Sequential Aggregate Signatures and Multisignatures Without Random Oracles , 2006, EUROCRYPT.

[18]  Di Ma,et al.  Practical forward secure sequential aggregate signatures , 2008, ASIACCS '08.

[19]  Mihir Bellare,et al.  A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.

[20]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[21]  Dominique Schröder,et al.  How to Aggregate the CL Signature Scheme , 2011, ESORICS.

[22]  Veronika Kuchta,et al.  Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions , 2013, CANS.

[23]  Gene Itkis,et al.  SiBIR: Signer-Base Intrusion-Resilient Signatures , 2002, CRYPTO.

[24]  Yoojae Won,et al.  Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security , 2012 .

[25]  Yu Jia,et al.  Strong Key-Insulated Signature Scheme Supporting Multi-Helpers in the Standard Model , 2014 .

[26]  Shouhuai Xu,et al.  Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.

[27]  Hideki Imai,et al.  Parallel Key-Insulated Public Key Encryption , 2006, Public Key Cryptography.

[28]  Rong Hao,et al.  One forward-secure signature scheme using bilinear maps and its applications , 2014, Inf. Sci..

[29]  Kyung-Ah Shim An ID-based aggregate signature scheme with constant pairing computations , 2010, J. Syst. Softw..

[30]  Stanislaw Jarecki,et al.  Identity-Based Aggregate and Multi-Signature Schemes Based on RSA , 2010, Public Key Cryptography.