2002
DOI: 10.1007/3-540-46035-7_5
|View full text |Cite
|
Sign up to set email alerts
|

Key-Insulated Public Key Cryptosystems

Abstract: Abstract. Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by secret-key exposures. In our model, the secret key(s) stored on the insecure device are refreshed at discrete time periods via interaction with a physical… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
218
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 278 publications
(218 citation statements)
references
References 34 publications
(55 reference statements)
0
218
0
Order By: Relevance
“…A natural question is whether their ciphertexts can be made to have size independent of q (or, at the very least, o(q)). 4 Indeed, in light of the results of Dodis, Katz, Xu and Yung [DKXY02] and most recently, Goldwasser, Lewko and Wilson [GLW12] in the context of bounded-collusion IBE, one might expect that achieving "short" ciphertexts is actually be possible in general.…”
Section: New Lower Bound: Impossibility For Simulation-based Definitionsmentioning
confidence: 99%
“…A natural question is whether their ciphertexts can be made to have size independent of q (or, at the very least, o(q)). 4 Indeed, in light of the results of Dodis, Katz, Xu and Yung [DKXY02] and most recently, Goldwasser, Lewko and Wilson [GLW12] in the context of bounded-collusion IBE, one might expect that achieving "short" ciphertexts is actually be possible in general.…”
Section: New Lower Bound: Impossibility For Simulation-based Definitionsmentioning
confidence: 99%
“…A second related class of solutions is known as Key Insulated and Intrusion Resilient signatures [11,14]. In a nutshell, this model and ours are incomparable, but we believe that our approach is the more realistic of the two.…”
Section: Related Workmentioning
confidence: 95%
“…But to show this thinking is wrong, we give an exceptional attack (decryption key exposure), wherein an adversary is allowed to obtain a decryption key dk ID * ,T with the condition T ̸ = T * . This setting is based on the similar attitude of key-insulated PKE [16], where it is desired that no information of the plaintext is revealed from a ciphertext even if all (short-term) decryption keys of a "different time period" are exposed. This kind of attack is not covered by the Boldyreva et al security model; that is, the adversary may obtain not a secret key sk ID * but a decryption key dk ID * ,T , and ID * can still be alive in the system in the challenge time period T * ̸ = T .…”
Section: Introductionmentioning
confidence: 99%