An Efficient Threshold Key-Insulated Signature Scheme
To tackle the key-exposure problem in signature settings, this paper introduces a new cryptographic primitive named threshold key-insulated signature (TKIS) and proposes a concrete TKIS scheme. For a TKIS system, at least k out of n helpers are needed to update a user's temporary private key. On the...
Saved in:
Published in | Shanghai jiao tong da xue xue bao Vol. 16; no. 6; pp. 658 - 662 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
Heidelberg
Shanghai Jiaotong University Press
01.12.2011
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | To tackle the key-exposure problem in signature settings, this paper introduces a new cryptographic primitive named threshold key-insulated signature (TKIS) and proposes a concrete TKIS scheme. For a TKIS system, at least k out of n helpers are needed to update a user's temporary private key. On the one hand, even if up to k-1 helpers are compromised in addition to the exposure of any of temporary private keys, security of the non-exposed periods is still assured. On the other hand, even if all the n helpers are compromised, we can still ensure the security of all periods as long as none of temporary private keys is exposed. Compared with traditional key-insulated signature (KIS) schemes, the proposed TKIS scheme not only greatly enhances the security of the system, but also provides flexibility and efficiency. |
---|---|
Bibliography: | 31-1943/U To tackle the key-exposure problem in signature settings, this paper introduces a new cryptographic primitive named threshold key-insulated signature (TKIS) and proposes a concrete TKIS scheme. For a TKIS system, at least k out of n helpers are needed to update a user's temporary private key. On the one hand, even if up to k-1 helpers are compromised in addition to the exposure of any of temporary private keys, security of the non-exposed periods is still assured. On the other hand, even if all the n helpers are compromised, we can still ensure the security of all periods as long as none of temporary private keys is exposed. Compared with traditional key-insulated signature (KIS) schemes, the proposed TKIS scheme not only greatly enhances the security of the system, but also provides flexibility and efficiency. threshold key-insulation, signature, random oracle model ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
ISSN: | 1007-1172 1995-8188 |
DOI: | 10.1007/s12204-011-1207-3 |