|
|
Identity-Based Key-Insulated Proxy Signature Without Random Oracles |
CHEN Jian-hong 1,2,3(陈剑洪), LONG Yu 1(龙 宇), CHEN Ke-fei 1,3(陈克非), WANG Yong-tao 1(王永涛) |
(1. Department of Computer Science and Engineering, Shanghai Jiaotong
University, Shanghai 200240, China; 2. School of Computer Engineering,
Huaiyin Institute of Technology, Huai'an 223003, Jiangsu, China; 3. Shanghai
Key Laboratory of Scalable Computing and System, Shanghai Jiaotong
University, Shanghai 200240, China) |
|
|
Abstract Abstract: In an identity based proxy signature (IBPS) scheme, a
designated proxy signer can generate the signature on behalf of an original
signer. Traditional IBPS schemes normally rely on the assumption that
private keys are kept perfectly secure. However, due to viruses, worms or
other break-ins allowed by operating-system holes, key exposure seems
inevitable. To minimize the damage caused by key exposure in IBPS, we
propose an identity-based key-insulated proxy signature (IBKIPS) scheme in
the standard model, i.e. without random oracles.
|
Received: 10 February 2011
Published: 29 October 2011
|
|
Fund: the National Natural Science Foundation of China of China (Nos. 60970111,60903189 and 60903020), the National High Technology Reaearch and Development Program (863) of Chia (No.2009AA01Z418), and the National Basic Research Program (973) of China (No. 2007CB311201) |
Corresponding Authors:
CHEN Jian-hong (陈剑洪),
E-mail: chenjianhong_cis@sjtu.edu.cn
|
|
|
|
[1] |
QIU Wei-dong (邱卫东), JIN Ling (金 凌), YANG Xiao-niu (杨小牛), YANG Hong-wa (杨红娃). Bit Stream Oriented Enumeration Tree Pruning Algorithm [J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 567-570. |
[2] |
WAN Zhong-mei (万中美), Meng Xiang-qin (孟祥芹), HONG Xuan (洪 璇). Certificateless Strong Key-Insulated Signature Without Random Oracles[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 571-576. |
[3] |
TSO Ray-lin (左瑞麟), KIM Cheonshik, YI Xun (易 训). Certificateless Message Recovery Signatures Providing Girault's Level-3 Security[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 577-585. |
[4] |
CHIEN Hung-yu (简宏宇), YEH Ming-kuei (叶明贵), WU Tzong-chen (吴宗成), LEE Chin-i (李静怡). Comments on Enhanced Yoking Proof Protocols for Radio Frequency
Identification Tags and Tag Groups[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 604-609. |
|
|
|
|