Loading…

Forward-secure identity-based signature: Security notions and construction

The security of traditional identity-based signatures wholly depends on the security of secret keys. Exposure of secret keys requires reissuing all previously assigned signatures. This limitation becomes more obvious today as key exposure is more common with increasing use of mobile and unprotected...

Full description

Saved in:
Bibliographic Details
Published in:Information sciences 2011-02, Vol.181 (3), p.648-660
Main Authors: Yu, Jia, Hao, Rong, Kong, Fanyu, Cheng, Xiangguo, Fan, Jianxi, Chen, Yangkui
Format: Article
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c395t-aa1494676fc9a25245f2f3e31d82629d6b1394393f2fd5abea4c8fa4a4449d1e3
cites
container_end_page 660
container_issue 3
container_start_page 648
container_title Information sciences
container_volume 181
creator Yu, Jia
Hao, Rong
Kong, Fanyu
Cheng, Xiangguo
Fan, Jianxi
Chen, Yangkui
description The security of traditional identity-based signatures wholly depends on the security of secret keys. Exposure of secret keys requires reissuing all previously assigned signatures. This limitation becomes more obvious today as key exposure is more common with increasing use of mobile and unprotected devices. Under this background, mitigating the damage of key exposure in identity-based signatures is an important problem. To deal with this problem, we propose to integrate forward security into identity-based signatures. In this paper, we firstly formalize the definition and security notions for forward-secure identity-based signature scheme, and then construct an efficient scheme. All parameters in our scheme have, at most, log-squared complexity in terms of the total number of time periods. The scheme is provably secure without random oracles.
doi_str_mv 10.1016/j.ins.2010.09.034
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_855691442</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0020025510004883</els_id><sourcerecordid>855691442</sourcerecordid><originalsourceid>FETCH-LOGICAL-c395t-aa1494676fc9a25245f2f3e31d82629d6b1394393f2fd5abea4c8fa4a4449d1e3</originalsourceid><addsrcrecordid>eNp9UDtPwzAQthBIlMIPYMvGlOB3Y5hQRXmoEgMwW659Qa5ap9gOqP--jsrMdHff43T3IXRNcEMwkbfrxofUUFxmrBrM-AmakHZGa0kVOUUTjCmuMRXiHF2ktMYY85mUE_S66OOvia5OYIcIlXcQss_7emUSuCr5r2ByIe6q91FQmCr02fchVSa4ypYmx8GOyCU668wmwdVfnaLPxePH_Llevj29zB-WtWVK5NoYwhWXM9lZZaigXHS0Y8CIa2k51skVYYozxQrshFmB4bbtDDecc-UIsCm6Oe7dxf57gJT11icLm40J0A9Jt0JIRTinRUmOShv7lCJ0ehf91sS9JliPsem1LrHpMTaNlS6xFc_90QPlhR8PUSfrIVhwPoLN2vX-H_cBGPd2gg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>855691442</pqid></control><display><type>article</type><title>Forward-secure identity-based signature: Security notions and construction</title><source>ScienceDirect Freedom Collection 2022-2024</source><creator>Yu, Jia ; Hao, Rong ; Kong, Fanyu ; Cheng, Xiangguo ; Fan, Jianxi ; Chen, Yangkui</creator><creatorcontrib>Yu, Jia ; Hao, Rong ; Kong, Fanyu ; Cheng, Xiangguo ; Fan, Jianxi ; Chen, Yangkui</creatorcontrib><description>The security of traditional identity-based signatures wholly depends on the security of secret keys. Exposure of secret keys requires reissuing all previously assigned signatures. This limitation becomes more obvious today as key exposure is more common with increasing use of mobile and unprotected devices. Under this background, mitigating the damage of key exposure in identity-based signatures is an important problem. To deal with this problem, we propose to integrate forward security into identity-based signatures. In this paper, we firstly formalize the definition and security notions for forward-secure identity-based signature scheme, and then construct an efficient scheme. All parameters in our scheme have, at most, log-squared complexity in terms of the total number of time periods. The scheme is provably secure without random oracles.</description><identifier>ISSN: 0020-0255</identifier><identifier>EISSN: 1872-6291</identifier><identifier>DOI: 10.1016/j.ins.2010.09.034</identifier><language>eng</language><publisher>Elsevier Inc</publisher><subject>Bilinear maps ; Complexity ; Computer information security ; Construction ; Damage ; Devices ; Digital signature ; Forward security ; Identity-based signature ; Key exposure ; Keys ; Security ; Signatures</subject><ispartof>Information sciences, 2011-02, Vol.181 (3), p.648-660</ispartof><rights>2010 Elsevier Inc.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c395t-aa1494676fc9a25245f2f3e31d82629d6b1394393f2fd5abea4c8fa4a4449d1e3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Yu, Jia</creatorcontrib><creatorcontrib>Hao, Rong</creatorcontrib><creatorcontrib>Kong, Fanyu</creatorcontrib><creatorcontrib>Cheng, Xiangguo</creatorcontrib><creatorcontrib>Fan, Jianxi</creatorcontrib><creatorcontrib>Chen, Yangkui</creatorcontrib><title>Forward-secure identity-based signature: Security notions and construction</title><title>Information sciences</title><description>The security of traditional identity-based signatures wholly depends on the security of secret keys. Exposure of secret keys requires reissuing all previously assigned signatures. This limitation becomes more obvious today as key exposure is more common with increasing use of mobile and unprotected devices. Under this background, mitigating the damage of key exposure in identity-based signatures is an important problem. To deal with this problem, we propose to integrate forward security into identity-based signatures. In this paper, we firstly formalize the definition and security notions for forward-secure identity-based signature scheme, and then construct an efficient scheme. All parameters in our scheme have, at most, log-squared complexity in terms of the total number of time periods. The scheme is provably secure without random oracles.</description><subject>Bilinear maps</subject><subject>Complexity</subject><subject>Computer information security</subject><subject>Construction</subject><subject>Damage</subject><subject>Devices</subject><subject>Digital signature</subject><subject>Forward security</subject><subject>Identity-based signature</subject><subject>Key exposure</subject><subject>Keys</subject><subject>Security</subject><subject>Signatures</subject><issn>0020-0255</issn><issn>1872-6291</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNp9UDtPwzAQthBIlMIPYMvGlOB3Y5hQRXmoEgMwW659Qa5ap9gOqP--jsrMdHff43T3IXRNcEMwkbfrxofUUFxmrBrM-AmakHZGa0kVOUUTjCmuMRXiHF2ktMYY85mUE_S66OOvia5OYIcIlXcQss_7emUSuCr5r2ByIe6q91FQmCr02fchVSa4ypYmx8GOyCU668wmwdVfnaLPxePH_Llevj29zB-WtWVK5NoYwhWXM9lZZaigXHS0Y8CIa2k51skVYYozxQrshFmB4bbtDDecc-UIsCm6Oe7dxf57gJT11icLm40J0A9Jt0JIRTinRUmOShv7lCJ0ehf91sS9JliPsem1LrHpMTaNlS6xFc_90QPlhR8PUSfrIVhwPoLN2vX-H_cBGPd2gg</recordid><startdate>20110201</startdate><enddate>20110201</enddate><creator>Yu, Jia</creator><creator>Hao, Rong</creator><creator>Kong, Fanyu</creator><creator>Cheng, Xiangguo</creator><creator>Fan, Jianxi</creator><creator>Chen, Yangkui</creator><general>Elsevier Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20110201</creationdate><title>Forward-secure identity-based signature: Security notions and construction</title><author>Yu, Jia ; Hao, Rong ; Kong, Fanyu ; Cheng, Xiangguo ; Fan, Jianxi ; Chen, Yangkui</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c395t-aa1494676fc9a25245f2f3e31d82629d6b1394393f2fd5abea4c8fa4a4449d1e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Bilinear maps</topic><topic>Complexity</topic><topic>Computer information security</topic><topic>Construction</topic><topic>Damage</topic><topic>Devices</topic><topic>Digital signature</topic><topic>Forward security</topic><topic>Identity-based signature</topic><topic>Key exposure</topic><topic>Keys</topic><topic>Security</topic><topic>Signatures</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yu, Jia</creatorcontrib><creatorcontrib>Hao, Rong</creatorcontrib><creatorcontrib>Kong, Fanyu</creatorcontrib><creatorcontrib>Cheng, Xiangguo</creatorcontrib><creatorcontrib>Fan, Jianxi</creatorcontrib><creatorcontrib>Chen, Yangkui</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yu, Jia</au><au>Hao, Rong</au><au>Kong, Fanyu</au><au>Cheng, Xiangguo</au><au>Fan, Jianxi</au><au>Chen, Yangkui</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Forward-secure identity-based signature: Security notions and construction</atitle><jtitle>Information sciences</jtitle><date>2011-02-01</date><risdate>2011</risdate><volume>181</volume><issue>3</issue><spage>648</spage><epage>660</epage><pages>648-660</pages><issn>0020-0255</issn><eissn>1872-6291</eissn><abstract>The security of traditional identity-based signatures wholly depends on the security of secret keys. Exposure of secret keys requires reissuing all previously assigned signatures. This limitation becomes more obvious today as key exposure is more common with increasing use of mobile and unprotected devices. Under this background, mitigating the damage of key exposure in identity-based signatures is an important problem. To deal with this problem, we propose to integrate forward security into identity-based signatures. In this paper, we firstly formalize the definition and security notions for forward-secure identity-based signature scheme, and then construct an efficient scheme. All parameters in our scheme have, at most, log-squared complexity in terms of the total number of time periods. The scheme is provably secure without random oracles.</abstract><pub>Elsevier Inc</pub><doi>10.1016/j.ins.2010.09.034</doi><tpages>13</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0020-0255
ispartof Information sciences, 2011-02, Vol.181 (3), p.648-660
issn 0020-0255
1872-6291
language eng
recordid cdi_proquest_miscellaneous_855691442
source ScienceDirect Freedom Collection 2022-2024
subjects Bilinear maps
Complexity
Computer information security
Construction
Damage
Devices
Digital signature
Forward security
Identity-based signature
Key exposure
Keys
Security
Signatures
title Forward-secure identity-based signature: Security notions and construction
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T19%3A25%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Forward-secure%20identity-based%20signature:%20Security%20notions%20and%20construction&rft.jtitle=Information%20sciences&rft.au=Yu,%20Jia&rft.date=2011-02-01&rft.volume=181&rft.issue=3&rft.spage=648&rft.epage=660&rft.pages=648-660&rft.issn=0020-0255&rft.eissn=1872-6291&rft_id=info:doi/10.1016/j.ins.2010.09.034&rft_dat=%3Cproquest_cross%3E855691442%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c395t-aa1494676fc9a25245f2f3e31d82629d6b1394393f2fd5abea4c8fa4a4449d1e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=855691442&rft_id=info:pmid/&rfr_iscdi=true