Journal
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
Volume 33, Issue 10, Pages 1211-1218Publisher
ELSEVIER
DOI: 10.1016/j.jksuci.2018.08.011
Keywords
Identity-based signature scheme; Key insulation mechanism; ROM security model; ECDLP
Categories
Ask authors/readers for more resources
Public Key Cryptosystem (PKC) relies on the security of the user's private key, and exposure of the private key can lead to disastrous situations. To address this issue, a key-insulation mechanism was introduced. Identity-based cryptosystems alleviate certificate management issues in traditional PKC and a pairing-free key insulated signature scheme in identity-based setting has been proposed to improve efficiency and resist private key exposure.
Public Key Cryptosystem (PKC) completely relies under the assumption that user's private key is abso-lutely secure. Exposure of private key may lead to disastrous situations in the communication network. To diminish the damage of private key exposure in PKC, key-insulation mechanism was introduced. In key-insulated cryptosystems, a user can update his private key with the help of a physically secure device from time to time. Identity-based cryptosystem alleviates the heavy certificate management problems in traditional PKC. Recently, many Identity-based key insulated signature schemes have been proposed in literature; however, most of the Identity-based schemes are designed based on the expensive bilinear pairing operation over elliptic curves. Due to the heavy computational cost of a pairing, the pairing based schemes are less efficient in practice. In order to improve the computational and communicational effi-ciency and to resist the problem of private key exposure in Identity-based signature schemes, we present a pairing-free key insulated signature scheme in identity based setting. We show that this scheme is unforgeable and achieves strong key insulation property with secure key updates, under the hardness of the Elliptic Curve Discrete Logarithm Problem (ECDLP). The performance analysis shows that our scheme is more efficient than the existing schemes. (c) 2018 The Authors. Production and hosting by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available