2013
DOI: 10.1002/cpe.3019
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure certificate‐based key‐insulated signature scheme

Abstract: SUMMARYCertificate-based signature computation is often performed on insecure devices where the signature key is easy to be exposed. To reduce the influence of key exposure, we introduce key-insulated mechanism into certificate-based cryptography and formalize the notion and security model of the certificate-based key-insulated signature scheme. We then present a certificate-based key-insulated signature scheme, which is proven to be existentially unforgeable against adaptive chosen message attacks in the rand… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…Subsequently, Zhu et al [38] determined that scheme [33] is insecure and reported an improvement. Li et al [39] proposed a certificate-based key-insulated signature scheme in the same year. Xiong et al [40] proposed a pairingfree certificate-based key-insulated signature scheme for lowpower devices, and Lu et al [41] proposed a certificateless strong key-insulated signature in the standard model in 2015.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Subsequently, Zhu et al [38] determined that scheme [33] is insecure and reported an improvement. Li et al [39] proposed a certificate-based key-insulated signature scheme in the same year. Xiong et al [40] proposed a pairingfree certificate-based key-insulated signature scheme for lowpower devices, and Lu et al [41] proposed a certificateless strong key-insulated signature in the standard model in 2015.…”
Section: Related Workmentioning
confidence: 99%
“…By referring to the security models of schemes [6,13,33,34,39,41], we have the following nine definitions. The first four definitions focus on the first type of exposure, Definitions 5-8 focus on the last type of exposure, and Definition 9 focuses on the second type of exposure.…”
Section: Formal Definitionmentioning
confidence: 99%
“…To reduce the influence of key exposure, Li et al . introduce key‐insulated mechanism into certificate‐based cryptography and formalize the notion and security model of the certificate‐based key‐insulated signature scheme in ‘Provably Secure Certificate‐based Key‐Insulated Signature Scheme’ . The authors present a certificate‐based key‐insulated signature scheme, which is proven to be existentially unforgeable against adaptive chosen message attacks in the random oracle model.…”
Section: This Special Issuementioning
confidence: 99%