An improved certificateless strong key-insulated signature scheme in the standard model

Exposure of secret keys may be the most devastating attack on a public key cryptographic scheme since such that security is entirely lost. The key-insulated security provides a promising approach to deal with this threat since it can effectively mitigate the damage caused by the secret key exposure. To eliminate the cumbersome certificate management in traditional PKI-supported key-insulated signature while overcoming the key escrow problem in identity-based key-insulated signature, two certificateless key-insulated signature schemes without random oracles have been proposed so far. However, both of them suffer from some security drawbacks and do not achieve existential unforgeability. In this paper, we propose a new certificateless strong key-insulated signature scheme that is proven secure in the standard model. Compared with the previous certificateless strong proxy signature scheme, the proposed scheme offers stronger security and enjoys higher computational efficiency and shorter public parameters.

[1]  Jian Weng,et al.  Identity-Based Key-Insulated Signature Without Random Oracles , 2006, 2006 International Conference on Computational Intelligence and Security.

[2]  Dong Hoon Lee,et al.  Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles) , 2007, Pairing.

[3]  Xiang-qin Meng,et al.  Certificateless strong key-insulated signature without random oracles , 2011 .

[4]  Junji Shikata,et al.  Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application , 2005, ASIACRYPT.

[5]  Mihir Bellare,et al.  Protecting against key-exposure: strongly key-insulated encryption with optimal threshold , 2005, Applicable Algebra in Engineering, Communication and Computing.

[6]  Limin Shen,et al.  Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles , 2014, Secur. Commun. Networks.

[7]  Nicolás González-Deleito,et al.  A New Key-Insulated Signature Scheme , 2004, ICICS.

[8]  Jianhua Chen,et al.  New certificateless short signature scheme , 2013, IET Inf. Secur..

[9]  Willy Susilo,et al.  Strongly secure certificateless short signatures , 2012, J. Syst. Softw..

[10]  Duncan S. Wong,et al.  Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.

[11]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[12]  Dong Hoon Lee,et al.  Efficient Certificateless Signature Schemes , 2007, ACNS.

[13]  Joseph K. Liu,et al.  Solutions to Key Exposure Problem in Ring Signature , 2008, Int. J. Netw. Secur..

[14]  Jian Weng,et al.  Identity-Based Threshold Key-Insulated Encryption without Random Oracles , 2008, CT-RSA.

[15]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[16]  Junji Shikata,et al.  Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions , 2002, ICICS.

[17]  Jian Weng,et al.  Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction , 2006, INDOCRYPT.

[18]  Xinyi Huang,et al.  Efficient and Short Certificateless Signature , 2008, CANS.

[19]  Bo Zhu,et al.  Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN , 2009, ISA.

[20]  Shouhuai Xu,et al.  Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.

[21]  Joonsang Baek,et al.  Certificateless Public Key Encryption Without Pairing , 2005, ISC.

[22]  Jian Weng,et al.  Certificateless key-insulated signature without random oracles , 2009 .

[23]  이필중,et al.  Efficient Key Updating Signature Schemes Based on IBS , 2003 .

[24]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[25]  Yuan Zhou,et al.  Identity Based Key Insulated Signature , 2006, ISPEC.

[26]  Kenneth G. Paterson,et al.  Certificateless Encryption Schemes Strongly Secure in the Standard Model , 2008, Public Key Cryptography.

[27]  Joseph K. Liu,et al.  Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.

[28]  Jean-Jacques Quisquater,et al.  On Constructing Certificateless Cryptosystems from Identity Based Encryption , 2006, Public Key Cryptography.

[29]  Reihaneh Safavi-Naini,et al.  An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.

[30]  Junji Shikata,et al.  Unconditionally Secure Anonymous Encryption and Group Authentication , 2002, ASIACRYPT.

[31]  Hui Li,et al.  Short-ciphertext and BDH-based CCA2 secure certificateless encryption , 2010, Science China Information Sciences.

[32]  Shouhuai Xu,et al.  Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.

[33]  Hideki Imai,et al.  Parallel Key-Insulated Public Key Encryption , 2006, Public Key Cryptography.

[34]  Jian Weng,et al.  Identity-based key-insulated proxy signature , 2009 .