跳到主要导航 跳到搜索 跳到主要内容

Identity based key insulated signature

  • Yuan Zhou
  • , Zhenfu Cao*
  • , Zhenchuan Chai
  • *此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

Exposure of secret keys can be the most devastating attack on a signature scheme since such that security is entirely lost. In a certificated based environment, the certification revocation list (CRL) can be used to minimize the damage caused by key exposure. In an identity based environment however, key exposure may means that the corresponding entity of the exposed key cannot use his identity information as his public key any more, and is in fact removed from the identity based system. In last few years the notion of and implementations of key insulated cryptosystems have been suggested for protecting the security of cryptosystems. In this work, we apply the method of key insulation to identity based signature, and solve the key exposure problem existing in the identity based schemes. We start by developing the formal model for identity based key insulated signature. We then use the fact to construct a identity based key insulated signature scheme.

源语言英语
主期刊名Information Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings
226-234
页数9
DOI
出版状态已出版 - 2006
已对外发布
活动2nd International Conference on Information Security Practice and Experience, ISPEC 2006 - Hangzhou, 中国
期限: 11 4月 200614 4月 2006

出版系列

姓名Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
3903 LNCS
ISSN(印刷版)0302-9743
ISSN(电子版)1611-3349

会议

会议2nd International Conference on Information Security Practice and Experience, ISPEC 2006
国家/地区中国
Hangzhou
时期11/04/0614/04/06

指纹

探究 'Identity based key insulated signature' 的科研主题。它们共同构成独一无二的指纹。

引用此