`a`
Advances in Mathematics of Communications (AMC)
 

An improved certificateless strong key-insulated signature scheme in the standard model

Pages: 353 - 373, Volume 9, Issue 3, August 2015      doi:10.3934/amc.2015.9.353

 
       Abstract        References        Full Text (444.6K)       Related Articles       

Yang Lu - College of Computer and Information Engineering, Hohai University, 8 Focheng Xilu, Nanjing, Jiangsu 211100, China (email)
Quanling Zhang - College of Computer and Information Engineering, Hohai University, 8 Focheng Xilu, Nanjing, Jiangsu 211100, China (email)
Jiguo Li - College of Computer and Information Engineering, Hohai University, 8 Focheng Xilu, Nanjing, Jiangsu 211100, China (email)

Abstract: Exposure of secret keys may be the most devastating attack on a public key cryptographic scheme since such that security is entirely lost. The key-insulated security provides a promising approach to deal with this threat since it can effectively mitigate the damage caused by the secret key exposure. To eliminate the cumbersome certificate management in traditional PKI-supported key-insulated signature while overcoming the key escrow problem in identity-based key-insulated signature, two certificateless key-insulated signature schemes without random oracles have been proposed so far. However, both of them suffer from some security drawbacks and do not achieve existential unforgeability. In this paper, we propose a new certificateless strong key-insulated signature scheme that is proven secure in the standard model. Compared with the previous certificateless strong proxy signature scheme, the proposed scheme offers stronger security and enjoys higher computational efficiency and shorter public parameters.

Keywords:  Certificateless strong key-insulated signature, secret key exposure, key replacement attack, malicious KGC attack, standard model.
Mathematics Subject Classification:  Primary: 94A60; Secondary: 11T71.

Received: August 2014;      Revised: March 2015;      Available Online: July 2015.

 References