Key-insulated aggregate signature

Huiyan ZHAO, Jia YU, Shaoxia DUAN, Xiangguo CHENG, Rong HAO

PDF(318 KB)
PDF(318 KB)
Front. Comput. Sci. ›› 2014, Vol. 8 ›› Issue (5) : 837-846. DOI: 10.1007/s11704-014-3244-1
RESEARCH ARTICLE

Key-insulated aggregate signature

Author information +
History +

Abstract

In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the definition and the security model of the key-insulated aggregate signature. We also construct a concrete key-insulated aggregate signature scheme that meets our definition. Our scheme has the properties of efficient verification and short signature length. We prove the security of our scheme in the random oracle model under the computation Diffie-Hellman assumption.

Keywords

aggregate signature / key-insulated aggregate signature / provable security / bilinear pairings

Cite this article

Download citation ▾
Huiyan ZHAO, Jia YU, Shaoxia DUAN, Xiangguo CHENG, Rong HAO. Key-insulated aggregate signature. Front. Comput. Sci., 2014, 8(5): 837‒846 https://doi.org/10.1007/s11704-014-3244-1

References

[1]
Boneh D, Gentry C, Lynn B, Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. Lecture Notes in Computer Science, 2003, 2656: 416-432
CrossRef Google scholar
[2]
Lu S, Ostrovsky R, Sahai A, Shacham H. Sequential aggregate signatures and multisignatures without random oracles. Lecture Notes in Computer Science, 2006, 4004: 456-485
CrossRef Google scholar
[3]
Bagherzandi A, Jarecki S. Identity-Based aggregate and multisignature schemes based on RSA. Lecture <?Pub Caret?>Notes in Computer Science, 2010, 6056: 480-498
CrossRef Google scholar
[4]
Hohenberger S, Sahai A, Waters B. Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. Lecture Notes in Computer Science, 2013, 8042: 494-512
CrossRef Google scholar
[5]
Kuchta V, Manulis M. Unique aggregate signatures with applications to distributed verifiable random functions. Lecture Notes in Computer Science, 2013, 8257: 251-270
CrossRef Google scholar
[6]
Xia H, Jia Z, Li X, Ju L, Sha E. Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 2013, 11(7): 2096-2114
CrossRef Google scholar
[7]
Bellare M, Miner S. A forward-secure digital signature scheme. Lecture Notes in Computer Science, 1999, 1666: 431-448
[8]
Yu J, Hao R, Kong F, Cheng X, Fan J, Chen Y. Forward-secure identitybased signature: security notions and construction. Information Sciences, 2011, 181(3): 648-660
CrossRef Google scholar
[9]
Yu J, Kong F Y, Cheng X G, Hao R, Fan J X. Forward-secure identitybased public-key encryption without random oracles. Fundamenta Informaticae, 2011, 111(2): 241-256
[10]
Yu J, Kong F Y, Cheng X G, Hao R, Li G W. One forward-secure signature scheme using bilinear maps and its applications. Information Sciences, 2014, 279: 60-76
CrossRef Google scholar
[11]
Li W P, Xu C X, Zhang W Z, Zhu S X, Zhang X J. New forwardsecure signature schemes with untrusted update. Frontiers of Computer Science, 2013, 7(4): 536-543
CrossRef Google scholar
[12]
Dodis Y, Katz J, Xu S H, Yung M. Key-insulated public-key cryptosystems. Lecture Notes in Computer Science, 2002, 2332: 65-82
CrossRef Google scholar
[13]
Dodis Y, Luo W L, Xu S H, Yung M. Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. 2012: 57-58
[14]
Ge L R, Yu J, Cheng X G, Hao R, Zhao H Y, Li Meng. Strong keyinsulated signature scheme supporting multi-helpers in the standard model. Journal of Computer Research and Development, 2014, 51(5): 1081-1088 (in Chinese)
[15]
Chen J H, Chen K F, Long Y. Identity-based threshold key-insulated signature. High Technology Letters, 2012, 18(3): 275-280
[16]
Itkis G, Reyzin L. Signer-base intrusion-resilient signatures. Lecture Notes in Computer Science, 2002, 2442: 499-514
CrossRef Google scholar
[17]
Yu J, Kong F Y, Cheng X G, Hao R, Fan J X. Intrusion-resilient identity-based signature: security definition and construction. Journal of Systems and Software, 2012, 85(2): 382-391
CrossRef Google scholar
[18]
Pietro R D, Soriente C, Spognardi A, Tsudik G. Intrusion-resilient integrity in data-centric unattended WSNs. Pervasive and Mobile Computing, 2011, 7(4): 495-508
CrossRef Google scholar
[19]
Ma D. Practical forward secure sequential aggregate signatures. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. 2008, 341-352
[20]
Dodis Y, Katz J, Xu S, Yung M. Strong key-insulated signature schemes. Lecture Notes in Computer Science, 2003, 2567: 130-144
CrossRef Google scholar
[21]
Wan Z M, Lai X J, Weng J, Liu, S L, Long Y, Hong X. Strong keyinsulated signature in the standard model. Journal of Shanghai Jiaotong University, 2010, 15(6): 657-661
CrossRef Google scholar
[22]
Zhou Y, Cao Z, and Chai Z. Identity based key insulated signature, In: Proceedings of Information Security Practice and Experience Conference. 2006, 226-234
CrossRef Google scholar
[23]
Tseng Y M, Wu T Y, Wu J D. An efficient and provably secure Idbased signature scheme with batch verifications. International Journal of Innovative Computing, Information and Control, 2009, 5(11A): 3911-3922
[24]
Wu T Y, Tseng Y M and Yu Ch W. ID-based key-insulated signature scheme with batch verifications and its novel application. International Journal of Innovative Computing, Information and Control, 2012, 8(7A): 4797-4810
[25]
Lin H Y, Wu T S, Lee M L, Yeh C K. New efficient identity-based key-insulated multisignature scheme. International Journal of Machine Learning and Computing, 2013, 3(1): 117-120
CrossRef Google scholar
[26]
Hanaoka G, Hanaoka Y, Imai H. Parallel key-insulated public key encryption. Lecture Notes in Computer Science, 2006, 3958: 105-122
CrossRef Google scholar
[27]
Weng J, Chen K F, Li X X, Liu S L, Qiu W D. Parallel key-insulated signature framework and construction. Journal of Shanghai Jiaotong University, 2008, 13(1): 6-11
CrossRef Google scholar
[28]
Shim K A. An ID-based aggregate signature scheme with constant pairing computations. Journal of Systems and Software, 2010, 83(10): 1873-1880
CrossRef Google scholar
[29]
Schroder D. How to aggregate the CL signature scheme. Lecture Notes in Computer Science, 2011, 6879: 298-314
CrossRef Google scholar
[30]
Brogle K, Goldberg S, and Reyzin L. Sequential aggregate signatures with lazy verification from trapdoor permutations. Lecture Notes in Computer Science, 2012, 7658: 644-662
CrossRef Google scholar

RIGHTS & PERMISSIONS

2014 Higher Education Press and Springer-Verlag Berlin Heidelberg
AI Summary AI Mindmap
PDF(318 KB)

Accesses

Citations

Detail

Sections
Recommended

/