Identity based key insulated signature

  • Yuan Zhou
  • , Zhenfu Cao*
  • , Zhenchuan Chai
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

59 Scopus citations

Abstract

Exposure of secret keys can be the most devastating attack on a signature scheme since such that security is entirely lost. In a certificated based environment, the certification revocation list (CRL) can be used to minimize the damage caused by key exposure. In an identity based environment however, key exposure may means that the corresponding entity of the exposed key cannot use his identity information as his public key any more, and is in fact removed from the identity based system. In last few years the notion of and implementations of key insulated cryptosystems have been suggested for protecting the security of cryptosystems. In this work, we apply the method of key insulation to identity based signature, and solve the key exposure problem existing in the identity based schemes. We start by developing the formal model for identity based key insulated signature. We then use the fact to construct a identity based key insulated signature scheme.

Original languageEnglish
Title of host publicationInformation Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings
Pages226-234
Number of pages9
DOIs
StatePublished - 2006
Externally publishedYes
Event2nd International Conference on Information Security Practice and Experience, ISPEC 2006 - Hangzhou, China
Duration: 11 Apr 200614 Apr 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3903 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Conference on Information Security Practice and Experience, ISPEC 2006
Country/TerritoryChina
CityHangzhou
Period11/04/0614/04/06

Keywords

  • Bilinear Diffie-Hellman
  • Identity based cryptosystem
  • Key insulated cryptosystem

Fingerprint

Dive into the research topics of 'Identity based key insulated signature'. Together they form a unique fingerprint.

Cite this