Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications

نویسندگان

  • Noura Al Ebri
  • Joonsang Baek
  • Abdulhadi Shoufan
  • Quang Hieu Vu
چکیده

As modern cryptographic schemes rely their security on the secrecy of the private keys used in them, exposing such keys results in a total loss of security. In fact, attackers have been developing various techniques to seize the secret keys rather than to cryptanalyze the underlying cryptographic primitives. Digital signature schemes, which are widely employed in many applications, are not an exception to the key exposure problem. A number of solutions for protecting signature schemes from key exposure have been proposed, and one of them is a forward-secure signature. Informally, forward-secure signature schemes can guarantee the unforgeability of the past signatures, even if the current secret signing key is exposed. In this paper, we propose an efficient generic construction of forward-secure identity-based signature (FSIBS) that retains unforgeability of past signatures in spite of the exposure of the current signing key. Our construction, supported by formal security analysis, brings about concrete FSIBS schemes which are more efficient than existing schemes in the literature. Especially, one of our instantiations of FSIBS based on discrete-log primitive turns out to be the most efficient among existing ones. We extend our generic construction employing the technique used in Merkle’s tree signature to reduce the size of public parameters. Additional contribution of this paper is to refine the definition of security of FSIBS in such a way that users in the system can freely specify time periods over which their signing keys evolve.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Convertible limited (multi-) verifier signature: new constructions and applications

A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...

متن کامل

Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures

We give a generic construction for universal designated-verifier signature schemes from a large class, C, of signature schemes. The resulting schemes are efficient and have two important properties. Firstly, they are provably DV-unforgeable, non-transferable and also non-delegatable. Secondly, the signer and the designated verifier can independently choose their cryptographic settings. We also ...

متن کامل

Generic Constructions of Biometric Identity Based Encryption Systems

In this paper, we present a novel framework for the generic construction of biometric Identity Based Encryption (IBE) schemes, which do not require bilinear pairings and result in more efficient schemes than existing fuzzy IBE systems implemented for biometric identities. Also, we analyze the security properties that are specific to biometric IBE namely anonymity and identity privacy. Consideri...

متن کامل

Multi-Designated Verifiers Signatures Revisited

Multi-Designated Verifier Signature (MDVS) is a privacy-oriented signature scheme in which the signature produced can only be verified by a specific set of users. A generic MDVS scheme was proposed recently, which can be constructed from some ring signature schemes and a secure multi-party computation (SMC) protocol. In this paper, we try to remove the requirement of the costly SMC. We propose ...

متن کامل

A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model

In this work, we present a generic framework for constructing efficient signature schemes, ring signature schemes, and identity based encryption schemes, all in the standard model (without relying on random oracles). We start by abstracting the recent work of Hohenberger and Waters (Crypto 2009), and specifically their “prefix method”. We show a transformation taking a signature scheme with a v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JoWUA

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2013