Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2014, Vol. 8 Issue (5) : 837-846    https://doi.org/10.1007/s11704-014-3244-1
RESEARCH ARTICLE
Key-insulated aggregate signature
Huiyan ZHAO1,Jia YU1,2,3(),Shaoxia DUAN1,Xiangguo CHENG1,Rong HAO1
1. College of Information Engineering, Qingdao University, Qingdao 266071, China
2. Shandong Provincial Key Laboratory of Computer Network, Jinan 250014, China
3. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
 Download: PDF(318 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the definition and the security model of the key-insulated aggregate signature. We also construct a concrete key-insulated aggregate signature scheme that meets our definition. Our scheme has the properties of efficient verification and short signature length. We prove the security of our scheme in the random oracle model under the computation Diffie-Hellman assumption.

Keywords aggregate signature      key-insulated aggregate signature      provable security      bilinear pairings     
Issue Date: 11 October 2014
 Cite this article:   
Huiyan ZHAO,Jia YU,Shaoxia DUAN, et al. Key-insulated aggregate signature[J]. Front. Comput. Sci., 2014, 8(5): 837-846.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-014-3244-1
https://academic.hep.com.cn/fcs/EN/Y2014/V8/I5/837
1 Boneh D, Gentry C, Lynn B, Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. Lecture Notes in Computer Science, 2003, 2656: 416-432
https://doi.org/10.1007/3-540-39200-9_26
2 Lu S, Ostrovsky R, Sahai A, Shacham H. Sequential aggregate signatures and multisignatures without random oracles. Lecture Notes in Computer Science, 2006, 4004: 456-485
https://doi.org/10.1007/11761679_28
3 Bagherzandi A, Jarecki S. Identity-Based aggregate and multisignature schemes based on RSA. Lecture <?Pub Caret?>Notes in Computer Science, 2010, 6056: 480-498
https://doi.org/10.1007/978-3-642-13013-7_28
4 Hohenberger S, Sahai A, Waters B. Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. Lecture Notes in Computer Science, 2013, 8042: 494-512
https://doi.org/10.1007/978-3-642-40041-4_27
5 Kuchta V, Manulis M. Unique aggregate signatures with applications to distributed verifiable random functions. Lecture Notes in Computer Science, 2013, 8257: 251-270
https://doi.org/10.1007/978-3-319-02937-5_14
6 Xia H, Jia Z, Li X, Ju L, Sha E. Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 2013, 11(7): 2096-2114
https://doi.org/10.1016/j.adhoc.2012.02.009
7 Bellare M, Miner S. A forward-secure digital signature scheme. Lecture Notes in Computer Science, 1999, 1666: 431-448
8 Yu J, Hao R, Kong F, Cheng X, Fan J, Chen Y. Forward-secure identitybased signature: security notions and construction. Information Sciences, 2011, 181(3): 648-660
https://doi.org/10.1016/j.ins.2010.09.034
9 Yu J, Kong F Y, Cheng X G, Hao R, Fan J X. Forward-secure identitybased public-key encryption without random oracles. Fundamenta Informaticae, 2011, 111(2): 241-256
10 Yu J, Kong F Y, Cheng X G, Hao R, Li G W. One forward-secure signature scheme using bilinear maps and its applications. Information Sciences, 2014, 279: 60-76
https://doi.org/10.1016/j.ins.2014.03.082
11 Li W P, Xu C X, Zhang W Z, Zhu S X, Zhang X J. New forwardsecure signature schemes with untrusted update. Frontiers of Computer Science, 2013, 7(4): 536-543
https://doi.org/10.1007/s11704-013-2300-6
12 Dodis Y, Katz J, Xu S H, Yung M. Key-insulated public-key cryptosystems. Lecture Notes in Computer Science, 2002, 2332: 65-82
https://doi.org/10.1007/3-540-46035-7_5
13 Dodis Y, Luo W L, Xu S H, Yung M. Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. 2012: 57-58
14 Ge L R, Yu J, Cheng X G, Hao R, Zhao H Y, Li Meng. Strong keyinsulated signature scheme supporting multi-helpers in the standard model. Journal of Computer Research and Development, 2014, 51(5): 1081-1088 (in Chinese)
15 Chen J H, Chen K F, Long Y. Identity-based threshold key-insulated signature. High Technology Letters, 2012, 18(3): 275-280
16 Itkis G, Reyzin L. Signer-base intrusion-resilient signatures. Lecture Notes in Computer Science, 2002, 2442: 499-514
https://doi.org/10.1007/3-540-45708-9_32
17 Yu J, Kong F Y, Cheng X G, Hao R, Fan J X. Intrusion-resilient identity-based signature: security definition and construction. Journal of Systems and Software, 2012, 85(2): 382-391
https://doi.org/10.1016/j.jss.2011.08.034
18 Pietro R D, Soriente C, Spognardi A, Tsudik G. Intrusion-resilient integrity in data-centric unattended WSNs. Pervasive and Mobile Computing, 2011, 7(4): 495-508
https://doi.org/10.1016/j.pmcj.2010.12.003
19 Ma D. Practical forward secure sequential aggregate signatures. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. 2008, 341-352
20 Dodis Y, Katz J, Xu S, Yung M. Strong key-insulated signature schemes. Lecture Notes in Computer Science, 2003, 2567: 130-144
https://doi.org/10.1007/3-540-36288-6_10
21 Wan Z M, Lai X J, Weng J, Liu, S L, Long Y, Hong X. Strong keyinsulated signature in the standard model. Journal of Shanghai Jiaotong University, 2010, 15(6): 657-661
https://doi.org/10.1007/s12204-010-1064-5
22 Zhou Y, Cao Z, and Chai Z. Identity based key insulated signature, In: Proceedings of Information Security Practice and Experience Conference. 2006, 226-234
https://doi.org/10.1007/11689522_21
23 Tseng Y M, Wu T Y, Wu J D. An efficient and provably secure Idbased signature scheme with batch verifications. International Journal of Innovative Computing, Information and Control, 2009, 5(11A): 3911-3922
24 Wu T Y, Tseng Y M and Yu Ch W. ID-based key-insulated signature scheme with batch verifications and its novel application. International Journal of Innovative Computing, Information and Control, 2012, 8(7A): 4797-4810
25 Lin H Y, Wu T S, Lee M L, Yeh C K. New efficient identity-based key-insulated multisignature scheme. International Journal of Machine Learning and Computing, 2013, 3(1): 117-120
https://doi.org/10.7763/IJMLC.2013.V3.284
26 Hanaoka G, Hanaoka Y, Imai H. Parallel key-insulated public key encryption. Lecture Notes in Computer Science, 2006, 3958: 105-122
https://doi.org/10.1007/11745853_8
27 Weng J, Chen K F, Li X X, Liu S L, Qiu W D. Parallel key-insulated signature framework and construction. Journal of Shanghai Jiaotong University, 2008, 13(1): 6-11
https://doi.org/10.1007/s12204-008-0006-y
28 Shim K A. An ID-based aggregate signature scheme with constant pairing computations. Journal of Systems and Software, 2010, 83(10): 1873-1880
https://doi.org/10.1016/j.jss.2010.05.071
29 Schroder D. How to aggregate the CL signature scheme. Lecture Notes in Computer Science, 2011, 6879: 298-314
https://doi.org/10.1007/978-3-642-23822-2_17
30 Brogle K, Goldberg S, and Reyzin L. Sequential aggregate signatures with lazy verification from trapdoor permutations. Lecture Notes in Computer Science, 2012, 7658: 644-662
https://doi.org/10.1007/978-3-642-34961-4_39
[1] Yudi ZHANG, Debiao HE, Mingwu ZHANG, Kim-Kwang Raymond CHOO. A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm[J]. Front. Comput. Sci., 2020, 14(3): 143803-.
[2] Wei GAO, Guilin WANG, Kefei CHEN, Xueli WANG. Efficient identity-based threshold decryption scheme from bilinear pairings[J]. Front. Comput. Sci., 2018, 12(1): 177-189.
[3] Wenbo SHI,Neeraj KUMAR,Peng GONG,Zezhong ZHANG. Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing[J]. Front. Comput. Sci., 2014, 8(4): 656-666.
[4] Lin CHENG, Qiaoyan WEN, Zhengping JIN, Hua ZHANG. Cryptanalysis and improvement of a certificateless encryption scheme in the standard model[J]. Front. Comput. Sci., 2014, 8(1): 163-173.
[5] Haiyan SUN, Qiaoyan WEN, Hua ZHANG, Zhengping JIN. A novel pairing-free certificateless authenticated key agreement protocol with provable security[J]. Front Comput Sci, 2013, 7(4): 544-557.
[6] Rajeev Anand SAHU, Sahadeo PADHYE. Efficient ID-based proxy multi-signature scheme secure in random oracle[J]. Front Comput Sci, 2012, 6(4): 421-428.
[7] WANG Lingling, ZHANG Guoyin, MA Chunguang. ID-based deniable ring authentication with constant-size signature[J]. Front. Comput. Sci., 2008, 2(1): 106-112.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed