Certificateless key-insulated signature without random oracles

来源 :Journal of Zhejiang University Science A(An International Ap | 被引量 : 0次 | 上传用户:wzjjp
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signature scheme. To handle issues concerning the private key leakage in certificateless signature schemes, we devise the first certificateless key-insulated signature scheme. Our scheme applies the key-insulated mechanism to certificateless cryptography, one with neither certificate nor key escrow. We incorporate Waters (2005)’s signature scheme, Paterson and Schuldt (2006)’s identity-based signature scheme, and Liu et al.(2007)’s certificateless signature scheme to obtain a certificateless key-insulated signature scheme. Our scheme has two desirable properties. First, its security can be proved under the non-pairing-based generalized bilinear Diffie-Hellman (NGBDH) conjecture, without utilizing the random oracle model; second, it solves the key escrow problem in identity-based key-insulated signatures. To reduce the underlying danger induced by private key leakage, Dodis et al. (2003) proposed the first key-insulated signature scheme. To handle issues concerning the private key leakage in certificateless signature schemes, we devise the first certificateless key-insulated signature scheme. Our scheme applies the key-insulated mechanism to certificateless cryptography, one with neither certificate nor key escrow. Welude Waters (2005) ’s signature scheme, Paterson and Schuldt (2006) ’s identity-based signature scheme, and Liu et al. (2007)’ s certificateless signature scheme to obtain a certificateless key-insulated signature scheme. Our scheme has two desirable properties. First, its security can be proved under the non-pairing-based generalized bilinear Diffie-Hellman (NGBDH) conjecture, without utilizing the random oracle model; second, it solves the key escrow problem in identity -based key-insulated signatures.
其他文献
近年来随着信息技术的不断发展,各行各业都开始应用信息化手段提高工作效率,办公自动化程度逐步提高。同时,大家也逐渐意识到,信息技术在带来各种便利的同时,随之带来很多新
阅读教学是小学语文教学的基本环节,它是识字的重要途径;能够进行听说读写的综合训练,提高听话、说话和作文的能力;使学生获得多方面的知识,发展思维,提高认识。本文传统阅读
按照我国超常儿童研究协作组的观点,超常儿童主要是指智能发展显著高于同年龄常态儿童发展水平,或具有某方面特殊才能的儿童。国外称之为天才儿童。我国超常儿童研究协作组
Composite Web services need transactional support to guarantee their consistent and reliable execution.Due to the long running and inter-organizational characte
由于对网络经济概念认识上的片面性,以及关于网络经济、信息技术和信息技术产业理论研究的差异缺乏深入理解,国内经济学界对于网络和信息经济的研究日益表现出“趋同”特征:
Background: Capsule endoscopy is a novel non-invasive method for visualization of the entire small bowel. The diagnostic yield of capsule endoscopy depends on t
Learning Objective【学习目标】了解消化性溃疡急性出血的内镜治疗方法了解消化性溃疡急性出血的临床治疗推荐急性上消化道出血,即Treitz韧带近端出血,是发病率高且具有重要
AN/SQQ-89是目前世界上最著名且唯一的集成反潜作战系统,本文介绍该系统的基本构成,主要子系统的组成及功能。 AN / SQQ-89 is the world’s most famous and the only inte
当我们用好言好语温柔来教育孩子时,他却不领情,依然我行我素。无计可施的父母提高了音量、板起了面孔,孩子终于察觉到了我们的怒气,怯怯地退缩。凶产生了效果,却埋下了更多
改革开放以来的各项方针政策,给我国的各个领域带来了前所未有的活力,使我国的社会情况发生了复杂而深刻的变化。对于身处高等学校接受教育的大学生而言,这些变化不仅为他们