Title | ||
---|---|---|
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes |
Abstract | ||
---|---|---|
an important approach to resist the threat of key leakage, key insulated security allows secret keys to be periodically updated by using a physically-secure but computation-limited device. Recently, key insulated mechanism has been introduced into identity based (ID-based) signature to solve the key-leakage problem in ID-based signature scenarios. In this paper, we present two compact ID-based key-insulated signature schemes that try to minimize the total amount of message and signature. Compared with the up-to-date ID-based key-insulated signatures, our schemes enjoy the minimum net bandwidth and computation overhead. We also provide formal security proofs of our schemes under the Computational Diffie---Hellman assumption in the random oracle model. We focus on potential applications of our schemes to secret handshakes, but we believe they will find many other applications as well. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1007/s11277-014-2106-3 | Wireless Personal Communications: An International Journal |
Keywords | Field | DocType |
Identity-based cryptography,Key-insulated,Signature,Secret handshakes | Leakage (electronics),Computer science,Computer network,Ring signature,Random oracle,Mathematical proof,Bandwidth (signal processing),Schnorr signature,Computation | Journal |
Volume | Issue | ISSN |
80 | 4 | 0929-6212 |
Citations | PageRank | References |
1 | 0.35 | 23 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hu Xiong | 1 | 144 | 16.81 |
Songyang Wu | 2 | 27 | 3.43 |
Fagen Li | 3 | 564 | 61.11 |
Zhiguang Qin | 4 | 321 | 63.02 |