An efficient threshold key-insulated signature scheme |
| |
Authors: | Jian-hong Chen Yu Long Ke-fei Chen Yong-tao Wang Xiang-xue Li |
| |
Institution: | [1]Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China [2]School of Computer Engineering, Huaiyin Institute of Technology, Huai'an 223003, Jiangsu, China [3]Shanghai Key Laboratory of Scalable Computing and System, Shanghai Jiaotong University, Shanghai 200240, China [4]Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China |
| |
Abstract: | To tackle the key-exposure problem in signature settings, this paper introduces a new cryptographic primitive named threshold
key-insulated signature (TKIS) and proposes a concrete TKIS scheme. For a TKIS system, at least k out of n helpers are needed to update a user’s temporary private key. On the one hand, even if up to k−1 helpers are compromised in addition to the exposure of any of temporary private keys, security of the non-exposed periods
is still assured. On the other hand, even if all the n helpers are compromised, we can still ensure the security of all periods as long as none of temporary private keys is exposed.
Compared with traditional key-insulated signature (KIS) schemes, the proposed TKIS scheme not only greatly enhances the security
of the system, but also provides flexibility and efficiency. |
| |
Keywords: | |
本文献已被 维普 SpringerLink 等数据库收录! |
|