Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model

The key-insulated signature scheme provides a good method to solve key exposure problem. The key-insulated mechanism has been extended to the identity-based cryptography (IBC) and certificateless cryptography. As a new cryptographic primitive, certificate-based cryptography has unique advantage without key escrow problem in IBC and the complex certificate management problem in traditional PKI. However, certificate-based signature operations are usually performed on insecure environments where the signature key exposure is inevitable. In order to solve this problem, we introduce key-insulated idea into certificate-based cryptography and propose the notion and security model of the certificate-based key-insulated signature (CBKIS). In addition, we present a CBKIS scheme that is provably secure in the standard model. Security of scheme is reduced to the hardness of Non Pairing-based Generalized Bilinear DH problem and Many Diffie–Hellman problem. The proposed scheme solves the key exposure problem and improves the security in certificate-based cryptography.

[1]  Yi Mu,et al.  Constructions of certificate-based signature secure against key replacement attacks , 2010, J. Comput. Secur..

[2]  Yi Mu,et al.  Certificate-based Signatures Revisited , 2009, J. Univers. Comput. Sci..

[3]  Joseph K. Liu,et al.  Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.

[4]  Craig Gentry,et al.  Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.

[5]  Lizhong Xu,et al.  An efficient short certificate-based signature scheme , 2012, J. Syst. Softw..

[6]  R. Nicoll,et al.  Invited lecture , 1997, Neuroscience Research.

[7]  Rufen Huang,et al.  Provably Secure Certificate-based Signature Scheme Without Pairings , 2013 .

[8]  Youngho Park,et al.  Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET , 2009, MOBILIGHT.

[9]  M Yegani,et al.  Online professional networking: an effective interactive tool. , 2009, Poultry science.

[10]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[11]  Kenneth G. Paterson,et al.  Challenges for Trusted Computing , 2008, IEEE Security & Privacy Magazine.

[12]  Jian Weng,et al.  Identity-Based Threshold Key-Insulated Encryption without Random Oracles , 2008, CT-RSA.

[13]  Joonsang Baek,et al.  Certificate-Based Signature Schemes without Pairings or Random Oracles , 2008, ISC.

[14]  Yi Mu,et al.  On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.

[15]  Xinyi Huang,et al.  Certificate-based signcryption with enhanced security features , 2012, Comput. Math. Appl..

[16]  Ran Canetti,et al.  The random oracle methodology, revisited , 2000, JACM.

[17]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[18]  Yuan Zhou,et al.  Identity Based Key Insulated Signature , 2006, ISPEC.

[19]  Yi Mu,et al.  Certificate-Based Signature: Security Model and Efficient Construction , 2007, EuroPKI.

[20]  Tao Li,et al.  Certificate-Based Key-Insulated Signature , 2012, ICDKE.

[21]  Jian Weng,et al.  Identity-Based Key-Insulated Signature with Secure Key-Updates , 2006, Inscrypt.

[22]  Shouhuai Xu,et al.  Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.

[23]  Jian Weng,et al.  Certificateless key-insulated signature without random oracles , 2009 .

[24]  Shouhuai Xu,et al.  Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.

[25]  Hideki Imai,et al.  Parallel Key-Insulated Public Key Encryption , 2006, Public Key Cryptography.

[26]  Anna Lysyanskaya,et al.  Unique Signatures and Verifiable Random Functions from the DH-DDH Separation , 2002, CRYPTO.

[27]  Jiguo Li,et al.  Parallel key-insulated signature scheme without random oracles , 2013, Journal of Communications and Networks.

[28]  Jinhui Zhang,et al.  Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme , 2012 .

[29]  Goichiro Hanaoka,et al.  An Efficient Strong Key-Insulated Signature Scheme and Its Application , 2008, EuroPKI.

[30]  Jiguo Li,et al.  A Forward-Secure Certificate-Based Signature Scheme in the Standard Model , 2012, CSS.

[31]  Jian Weng,et al.  Identity-Based Parallel Key-Insulated Signature Without Random Oracles , 2008, J. Inf. Sci. Eng..

[32]  Je Hong Park,et al.  A Certificate-Based Signature Scheme , 2004, CT-RSA.

[33]  Jin Li,et al.  A Strong Identity Based Key-Insulated Cryptosystem , 2006, EUC Workshops.