首页 | 本学科首页   官方微博 | 高级检索  
     检索      


An efficient threshold key-insulated signature scheme
Authors:Jian-hong Chen  Yu Long  Ke-fei Chen  Yong-tao Wang  Xiang-xue Li
Institution:[1]Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China [2]School of Computer Engineering, Huaiyin Institute of Technology, Huai'an 223003, Jiangsu, China [3]Shanghai Key Laboratory of Scalable Computing and System, Shanghai Jiaotong University, Shanghai 200240, China [4]Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China
Abstract:To tackle the key-exposure problem in signature settings, this paper introduces a new cryptographic primitive named threshold key-insulated signature (TKIS) and proposes a concrete TKIS scheme. For a TKIS system, at least k out of n helpers are needed to update a user’s temporary private key. On the one hand, even if up to k−1 helpers are compromised in addition to the exposure of any of temporary private keys, security of the non-exposed periods is still assured. On the other hand, even if all the n helpers are compromised, we can still ensure the security of all periods as long as none of temporary private keys is exposed. Compared with traditional key-insulated signature (KIS) schemes, the proposed TKIS scheme not only greatly enhances the security of the system, but also provides flexibility and efficiency.
Keywords:
本文献已被 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号