Abstract
Exposure of secret keys can be the most devastating attack on a signature scheme since such that security is entirely lost. In a certificated based environment, the certification revocation list (CRL) can be used to minimize the damage caused by key exposure. In an identity based environment however, key exposure may means that the corresponding entity of the exposed key cannot use his identity information as his public key any more, and is in fact removed from the identity based system. In last few years the notion of and implementations of key insulated cryptosystems have been suggested for protecting the security of cryptosystems.
In this work, we apply the method of key insulation to identity based signature, and solve the key exposure problem existing in the identity based schemes. We start by developing the formal model for identity based key insulated signature. We then use the fact to construct a identity based key insulated signature scheme.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Yum, D.H., Lee, P.J.: Identity-Based Cryptography in public Key Management. In: Katsikas, S.K., Gritzalis, S., López, J. (eds.) EuroPKI 2004. LNCS, vol. 3093, pp. 71–84. Springer, Heidelberg (2004)
Shmir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Shmir, A.: How to share a secret. Comm. of the ACM 22(11), 612–613 (1979)
Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)
Ostrovsky, R., Yung, M.: How to withstand mobile virus attacks. In: PODC 1991, pp. 51–59. ACM Press, New York (1991)
Anderson, R.: Two remarks on public key cryptology. Invited Lecture, In: ACMCCS 1997 (1997), http://www.cl.cam.ac.uk/ftp/users/rja14/forwardsecure.pdf
Bellare, M., Miner, S.: A Forward-Secure Digital Signature Scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 431–448. Springer, Heidelberg (1999)
Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-insulated public key cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65–82. Springer, Heidelberg (2002)
Dodis, Y., Katz, J., Xu, S., Yung, M.: Strong Key-Insulated signature schemes. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 130–144. Springer, Heidelberg (2002)
Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268–286. Springer, Heidelberg (2004)
Libert, B., Quisquater, J.J.: The Exact Security of an Identity Based Signature and Its Applications., Availiable from http://eprint.iacr.org/2004/102
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhou, Y., Cao, Z., Chai, Z. (2006). Identity Based Key Insulated Signature. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2006. Lecture Notes in Computer Science, vol 3903. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11689522_21
Download citation
DOI: https://doi.org/10.1007/11689522_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33052-3
Online ISBN: 978-3-540-33058-5
eBook Packages: Computer ScienceComputer Science (R0)