Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front Comput Sci    2013, Vol. 7 Issue (4) : 536-543    https://doi.org/10.1007/s11704-013-2300-6
RESEARCH ARTICLE
New forward-secure signature schemes with untrusted update
Wanpeng LI1, Chunxiang XU1(), Wenzheng ZHANG2, Shixiong ZHU2, Xiujie ZHANG1
1. School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China; 2. Science and Technology on Communication Security Laboratory, The 30th Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China
 Download: PDF(334 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

In this paper, we present two forward-secure signature schemes (FSS) with untrusted update. Our constructions use ideas from the work of Abdalla et al. [1] and Kozlov and Reyzin [2] in their forward-secure digital signature schemes. Our schemes are proven to be forward-secure based on the hardness of factoring in the random oraclemodel. Both schemes use the same method to encrypt the private key and are more efficient than Libert scheme [3] without adding any burden to the original forward-secure schemes.

Keywords forward-secure      digital signature      untrusted update     
Corresponding Author(s): XU Chunxiang,Email:chxxu@uestc.edu.cn   
Issue Date: 01 August 2013
 Cite this article:   
Wanpeng LI,Chunxiang XU,Wenzheng ZHANG, et al. New forward-secure signature schemes with untrusted update[J]. Front Comput Sci, 2013, 7(4): 536-543.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-013-2300-6
https://academic.hep.com.cn/fcs/EN/Y2013/V7/I4/536
1 Abdalla M, Miner S, Namprempre C. Forward-secure threshold signature schemes. In: Naccache D ed. Topics in Cryptology—CT-RSA, 2001, LNCS , 2001, 2020: 441-456
2 Kozlov A, Reyzin L. Forward-secure signatures with fast key update. Security in Communication Networks , 2003, 241-256
3 Libert B, Quisquater J J, Yung M. Key evolution systems in untrusted update environments. ACM Transactions on Information and System Security (TISSEC) , 2010, 13(4): 37
doi: 10.1145/1880022.1880031
4 Anderson R. Invited lecture. In: The 4th ACM Annual Conference on Computer and Communications Security . 1997
5 Bellare M, Miner S. A forward-secure digital signature scheme. In: Proceedings of the 19th Annual International Cryptology Conference: Advances in Cryptology . 1999, 431-448
6 Itkis G, Reyzin L. Forward-secure signatures with optimal signing and verifying. In: Proceedings of the 21st Annual International Cryptology Conference: Advances in Cryptology . 2001, 332-354
7 Abdalla M, Reyzin L. A new forward-secure digital signature scheme. In: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology . 2000, 116-129
8 Nakanishi T, Hira Y, Funabiki N. Forward-secure group signatures from pairings. Pairing-Based Cryptography-Pairing , 2009, 171-186
9 Libert B, Yung M. Efficient traceable signatures in the standard model. In: Proceedings of the 3rd International Conference on Pairing-Based Cryptography . 2009, 187-205
10 Malkin T, Micciancio D, Miner S. Efficient generic forward-secure signatures with an unbounded number of time periods. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology (Eurocrypt 2002) . 2002, 400-417
11 Krawczyk H. Simple forward-secure signatures from any signature scheme. In: Proceedings of the 7th ACM Conference on Computer and Communications Security . 2000, 108-115
12 Boyen X, Shacham H, Shen E, Waters B. Forward-secure signatures with untrusted update. In: Proceedings of the 13th ACM Conference on Computer and Communications Security . 2006, 191-200
doi: 10.1145/1180405.1180430
13 Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security . 1993, 62-73
14 Micali S, Reyzin L. Improving the exact security of digital signature schemes. Journal of Cryptology , 2002, 15(1): 1-18
doi: 10.1007/s00145-001-0005-8
15 Fiat A, Shamir A. How to prove yourself: practical solutions to identi-fication and signature problems. In: Proceedings of Advances in Cryptology (Crypto’86) . 1987, 186-194
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed