4.8 Article

Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings

Journal

Publisher

ELSEVIER
DOI: 10.1016/j.jksuci.2018.08.011

Keywords

Identity-based signature scheme; Key insulation mechanism; ROM security model; ECDLP

Ask authors/readers for more resources

Public Key Cryptosystem (PKC) relies on the security of the user's private key, and exposure of the private key can lead to disastrous situations. To address this issue, a key-insulation mechanism was introduced. Identity-based cryptosystems alleviate certificate management issues in traditional PKC and a pairing-free key insulated signature scheme in identity-based setting has been proposed to improve efficiency and resist private key exposure.
Public Key Cryptosystem (PKC) completely relies under the assumption that user's private key is abso-lutely secure. Exposure of private key may lead to disastrous situations in the communication network. To diminish the damage of private key exposure in PKC, key-insulation mechanism was introduced. In key-insulated cryptosystems, a user can update his private key with the help of a physically secure device from time to time. Identity-based cryptosystem alleviates the heavy certificate management problems in traditional PKC. Recently, many Identity-based key insulated signature schemes have been proposed in literature; however, most of the Identity-based schemes are designed based on the expensive bilinear pairing operation over elliptic curves. Due to the heavy computational cost of a pairing, the pairing based schemes are less efficient in practice. In order to improve the computational and communicational effi-ciency and to resist the problem of private key exposure in Identity-based signature schemes, we present a pairing-free key insulated signature scheme in identity based setting. We show that this scheme is unforgeable and achieves strong key insulation property with secure key updates, under the hardness of the Elliptic Curve Discrete Logarithm Problem (ECDLP). The performance analysis shows that our scheme is more efficient than the existing schemes. (c) 2018 The Authors. Production and hosting by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available