Loading…
Forward-secure identity-based signature: Security notions and construction
The security of traditional identity-based signatures wholly depends on the security of secret keys. Exposure of secret keys requires reissuing all previously assigned signatures. This limitation becomes more obvious today as key exposure is more common with increasing use of mobile and unprotected...
Saved in:
Published in: | Information sciences 2011-02, Vol.181 (3), p.648-660 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c395t-aa1494676fc9a25245f2f3e31d82629d6b1394393f2fd5abea4c8fa4a4449d1e3 |
---|---|
cites | |
container_end_page | 660 |
container_issue | 3 |
container_start_page | 648 |
container_title | Information sciences |
container_volume | 181 |
creator | Yu, Jia Hao, Rong Kong, Fanyu Cheng, Xiangguo Fan, Jianxi Chen, Yangkui |
description | The security of traditional identity-based signatures wholly depends on the security of secret keys. Exposure of secret keys requires reissuing all previously assigned signatures. This limitation becomes more obvious today as key exposure is more common with increasing use of mobile and unprotected devices. Under this background, mitigating the damage of key exposure in identity-based signatures is an important problem. To deal with this problem, we propose to integrate forward security into identity-based signatures. In this paper, we firstly formalize the definition and security notions for forward-secure identity-based signature scheme, and then construct an efficient scheme. All parameters in our scheme have, at most, log-squared complexity in terms of the total number of time periods. The scheme is provably secure without random oracles. |
doi_str_mv | 10.1016/j.ins.2010.09.034 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_855691442</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0020025510004883</els_id><sourcerecordid>855691442</sourcerecordid><originalsourceid>FETCH-LOGICAL-c395t-aa1494676fc9a25245f2f3e31d82629d6b1394393f2fd5abea4c8fa4a4449d1e3</originalsourceid><addsrcrecordid>eNp9UDtPwzAQthBIlMIPYMvGlOB3Y5hQRXmoEgMwW659Qa5ap9gOqP--jsrMdHff43T3IXRNcEMwkbfrxofUUFxmrBrM-AmakHZGa0kVOUUTjCmuMRXiHF2ktMYY85mUE_S66OOvia5OYIcIlXcQss_7emUSuCr5r2ByIe6q91FQmCr02fchVSa4ypYmx8GOyCU668wmwdVfnaLPxePH_Llevj29zB-WtWVK5NoYwhWXM9lZZaigXHS0Y8CIa2k51skVYYozxQrshFmB4bbtDDecc-UIsCm6Oe7dxf57gJT11icLm40J0A9Jt0JIRTinRUmOShv7lCJ0ehf91sS9JliPsem1LrHpMTaNlS6xFc_90QPlhR8PUSfrIVhwPoLN2vX-H_cBGPd2gg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>855691442</pqid></control><display><type>article</type><title>Forward-secure identity-based signature: Security notions and construction</title><source>ScienceDirect Freedom Collection 2022-2024</source><creator>Yu, Jia ; Hao, Rong ; Kong, Fanyu ; Cheng, Xiangguo ; Fan, Jianxi ; Chen, Yangkui</creator><creatorcontrib>Yu, Jia ; Hao, Rong ; Kong, Fanyu ; Cheng, Xiangguo ; Fan, Jianxi ; Chen, Yangkui</creatorcontrib><description>The security of traditional identity-based signatures wholly depends on the security of secret keys. Exposure of secret keys requires reissuing all previously assigned signatures. This limitation becomes more obvious today as key exposure is more common with increasing use of mobile and unprotected devices. Under this background, mitigating the damage of key exposure in identity-based signatures is an important problem. To deal with this problem, we propose to integrate forward security into identity-based signatures. In this paper, we firstly formalize the definition and security notions for forward-secure identity-based signature scheme, and then construct an efficient scheme. All parameters in our scheme have, at most, log-squared complexity in terms of the total number of time periods. The scheme is provably secure without random oracles.</description><identifier>ISSN: 0020-0255</identifier><identifier>EISSN: 1872-6291</identifier><identifier>DOI: 10.1016/j.ins.2010.09.034</identifier><language>eng</language><publisher>Elsevier Inc</publisher><subject>Bilinear maps ; Complexity ; Computer information security ; Construction ; Damage ; Devices ; Digital signature ; Forward security ; Identity-based signature ; Key exposure ; Keys ; Security ; Signatures</subject><ispartof>Information sciences, 2011-02, Vol.181 (3), p.648-660</ispartof><rights>2010 Elsevier Inc.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c395t-aa1494676fc9a25245f2f3e31d82629d6b1394393f2fd5abea4c8fa4a4449d1e3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Yu, Jia</creatorcontrib><creatorcontrib>Hao, Rong</creatorcontrib><creatorcontrib>Kong, Fanyu</creatorcontrib><creatorcontrib>Cheng, Xiangguo</creatorcontrib><creatorcontrib>Fan, Jianxi</creatorcontrib><creatorcontrib>Chen, Yangkui</creatorcontrib><title>Forward-secure identity-based signature: Security notions and construction</title><title>Information sciences</title><description>The security of traditional identity-based signatures wholly depends on the security of secret keys. Exposure of secret keys requires reissuing all previously assigned signatures. This limitation becomes more obvious today as key exposure is more common with increasing use of mobile and unprotected devices. Under this background, mitigating the damage of key exposure in identity-based signatures is an important problem. To deal with this problem, we propose to integrate forward security into identity-based signatures. In this paper, we firstly formalize the definition and security notions for forward-secure identity-based signature scheme, and then construct an efficient scheme. All parameters in our scheme have, at most, log-squared complexity in terms of the total number of time periods. The scheme is provably secure without random oracles.</description><subject>Bilinear maps</subject><subject>Complexity</subject><subject>Computer information security</subject><subject>Construction</subject><subject>Damage</subject><subject>Devices</subject><subject>Digital signature</subject><subject>Forward security</subject><subject>Identity-based signature</subject><subject>Key exposure</subject><subject>Keys</subject><subject>Security</subject><subject>Signatures</subject><issn>0020-0255</issn><issn>1872-6291</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNp9UDtPwzAQthBIlMIPYMvGlOB3Y5hQRXmoEgMwW659Qa5ap9gOqP--jsrMdHff43T3IXRNcEMwkbfrxofUUFxmrBrM-AmakHZGa0kVOUUTjCmuMRXiHF2ktMYY85mUE_S66OOvia5OYIcIlXcQss_7emUSuCr5r2ByIe6q91FQmCr02fchVSa4ypYmx8GOyCU668wmwdVfnaLPxePH_Llevj29zB-WtWVK5NoYwhWXM9lZZaigXHS0Y8CIa2k51skVYYozxQrshFmB4bbtDDecc-UIsCm6Oe7dxf57gJT11icLm40J0A9Jt0JIRTinRUmOShv7lCJ0ehf91sS9JliPsem1LrHpMTaNlS6xFc_90QPlhR8PUSfrIVhwPoLN2vX-H_cBGPd2gg</recordid><startdate>20110201</startdate><enddate>20110201</enddate><creator>Yu, Jia</creator><creator>Hao, Rong</creator><creator>Kong, Fanyu</creator><creator>Cheng, Xiangguo</creator><creator>Fan, Jianxi</creator><creator>Chen, Yangkui</creator><general>Elsevier Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20110201</creationdate><title>Forward-secure identity-based signature: Security notions and construction</title><author>Yu, Jia ; Hao, Rong ; Kong, Fanyu ; Cheng, Xiangguo ; Fan, Jianxi ; Chen, Yangkui</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c395t-aa1494676fc9a25245f2f3e31d82629d6b1394393f2fd5abea4c8fa4a4449d1e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Bilinear maps</topic><topic>Complexity</topic><topic>Computer information security</topic><topic>Construction</topic><topic>Damage</topic><topic>Devices</topic><topic>Digital signature</topic><topic>Forward security</topic><topic>Identity-based signature</topic><topic>Key exposure</topic><topic>Keys</topic><topic>Security</topic><topic>Signatures</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yu, Jia</creatorcontrib><creatorcontrib>Hao, Rong</creatorcontrib><creatorcontrib>Kong, Fanyu</creatorcontrib><creatorcontrib>Cheng, Xiangguo</creatorcontrib><creatorcontrib>Fan, Jianxi</creatorcontrib><creatorcontrib>Chen, Yangkui</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yu, Jia</au><au>Hao, Rong</au><au>Kong, Fanyu</au><au>Cheng, Xiangguo</au><au>Fan, Jianxi</au><au>Chen, Yangkui</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Forward-secure identity-based signature: Security notions and construction</atitle><jtitle>Information sciences</jtitle><date>2011-02-01</date><risdate>2011</risdate><volume>181</volume><issue>3</issue><spage>648</spage><epage>660</epage><pages>648-660</pages><issn>0020-0255</issn><eissn>1872-6291</eissn><abstract>The security of traditional identity-based signatures wholly depends on the security of secret keys. Exposure of secret keys requires reissuing all previously assigned signatures. This limitation becomes more obvious today as key exposure is more common with increasing use of mobile and unprotected devices. Under this background, mitigating the damage of key exposure in identity-based signatures is an important problem. To deal with this problem, we propose to integrate forward security into identity-based signatures. In this paper, we firstly formalize the definition and security notions for forward-secure identity-based signature scheme, and then construct an efficient scheme. All parameters in our scheme have, at most, log-squared complexity in terms of the total number of time periods. The scheme is provably secure without random oracles.</abstract><pub>Elsevier Inc</pub><doi>10.1016/j.ins.2010.09.034</doi><tpages>13</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0020-0255 |
ispartof | Information sciences, 2011-02, Vol.181 (3), p.648-660 |
issn | 0020-0255 1872-6291 |
language | eng |
recordid | cdi_proquest_miscellaneous_855691442 |
source | ScienceDirect Freedom Collection 2022-2024 |
subjects | Bilinear maps Complexity Computer information security Construction Damage Devices Digital signature Forward security Identity-based signature Key exposure Keys Security Signatures |
title | Forward-secure identity-based signature: Security notions and construction |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T19%3A25%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Forward-secure%20identity-based%20signature:%20Security%20notions%20and%20construction&rft.jtitle=Information%20sciences&rft.au=Yu,%20Jia&rft.date=2011-02-01&rft.volume=181&rft.issue=3&rft.spage=648&rft.epage=660&rft.pages=648-660&rft.issn=0020-0255&rft.eissn=1872-6291&rft_id=info:doi/10.1016/j.ins.2010.09.034&rft_dat=%3Cproquest_cross%3E855691442%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c395t-aa1494676fc9a25245f2f3e31d82629d6b1394393f2fd5abea4c8fa4a4449d1e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=855691442&rft_id=info:pmid/&rfr_iscdi=true |