Identity-Based Threshold Key-Insulated Proxy Signature in the Standard Model
نویسندگان
چکیده
منابع مشابه
Identity Based Threshold Proxy Signature
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In a (t, n) threshold proxy signature scheme, the original signer delegates the power of signing messages to a designated proxy group of n members. Any t or more proxy signers of the group can cooperati...
متن کاملAttribute-Based Threshold Key-Insulated Signature
Key insulation is an important technique to protect private keys. To deal with the signing key exposure problem in attribute-based signature systems, we propose an attribute-based threshold key-insulated signature (ABTKIS) scheme. It strengthens the security and flexibility of existing attribute-based key-insulated signature schemes. Our scheme is provably secure in the standard model (i.e. wit...
متن کاملIdentity-based Threshold Signature Secure in the Standard Model
Recently, design of Identity-based (ID-based) threshold signature schemes which are efficient and provably secure in the standard model has drawn great concerns. In this paper, an ID-based threshold signature scheme based on Paterson and Schuldt’s signature scheme is presented. The proposed construction is proved secure in the standard model and its security rests on the hardness of the computa...
متن کاملIdentity-Based Strong Key-Insulated Signature Without Random Oracles
It is a worthwhile challenge to deal with the key-exposure problem in identity-based signatures. To deal with this problem, this paper adopts Dodis, et al.’s key-insulation mechanism to identity-based signature scenarios, and proposes an identity-based key-insulated signature scheme. The proposed scheme enjoys two attractive features: (i) it is strong key-insulated; (ii) it is provably secure w...
متن کاملIdentity-Based Parallel Key-Insulated Signature: Framework and Construction
To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) proposed an ID-based key-insulated signature (IBKIS) scheme. However, their scheme is not strong key-insulated, i.e, if a user’s helper is compromised, the adversary can derive all of this user’s secret keys for any time period. Moreover, in practice, to alleviate the damage in case of key-exposu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2019
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/1345/3/032088