Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2009, Vol. 10 Issue (12): 1790-1800    DOI: 10.1631/jzus.A0820714
Computer Science and Technology     
Certificateless key-insulated signature without random oracles
Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG
Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China; College of Science, Hohai University, Nanjing 210098, China; Department of Computer Science, Jinan University, Guangzhou 510630, China; School of Information Systems, Singapore Management University, Singapore 178902, Singapore
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signature scheme. To handle issues concerning the private key leakage in certificateless signature schemes, we devise the first certificateless key-insulated signature scheme. Our scheme applies the key-insulated mechanism to certificateless cryptography, one with neither certificate nor key escrow. We incorporate Waters (2005)’s signature scheme, Paterson and Schuldt (2006)’s identity-based signature scheme, and Liu et al.(2007)’s certificateless signature scheme to obtain a certificateless key-insulated signature scheme. Our scheme has two desirable properties. First, its security can be proved under the non-pairing-based generalized bilinear Diffie-Hellman (NGBDH) conjecture, without utilizing the random oracle model; second, it solves the key escrow problem in identity-based key-insulated signatures.

Key wordsKey-insulated      Key leakage      Certificateless      Bilinear map     
Received: 15 October 2008     
CLC:  TP311  
Cite this article:

Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG. Certificateless key-insulated signature without random oracles. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(12): 1790-1800.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.A0820714     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2009/V10/I12/1790

[1] Jin-hua JIANG, Ke CHEN, Xiao-yan LI, Gang CHEN, Li-dan SHOU. Efficient processing of ordered XML twig pattern matching based on extended Dewey[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(12): 1769-1783.
[2] Ying XU, Chang-fu ZONG, Hsiao-hsiang NA, Lei LIU. Investigations on control algorithm of steady-state cornering and control strategy for dynamical correction in a steer-by-wire system[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(6): 900-908.
[3] Peng HUANG, Jie ZHU. Predicting the fault-proneness of class hierarchy in object-oriented software using a layered kernel[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(10): 1390-1397.
[4] Qiong WEI, Yan-sheng LU, Lei ZOU. ε-inclusion: privacy preserving re-publication of dynamic datasets[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(8): 1124-1133.
[5] Jian HE, Hui LI, Yong ZHANG, Zhang-qin HUANG. Bluetooth-based authentication system for ambient intelligence[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(6): 770-775.
[6] Xun SUN, Jian-hua LI, Shu-tang YANG, Gong-liang CHEN. Non-interactive identity-based threshold signature scheme without random oracles[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(6): 727-736.
[7] Yi-jun BEI, Gang CHEN, Jin-xiang DONG, Ke CHEN. Bottom-up mining of XML query patterns to improve XML querying[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(6): 744-757.
[8] FAROOQ M., WANG Dao-bo. Implementation of a new PC based controller for a PUMA robot[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(12): 1962-1970.
[9] LIANG Jun-jie, FENG Yu-cai. Indexing the bit-code and distance for fast KNN search in high-dimensional spaces[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(6): 857-863.
[10] HUANG Chuan-dong, JIANG Fan. Timing issues in distributed testing[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(4): 522-528.
[11] PAN Peng, LU Yan-sheng. Monitoring nearest neighbor queries with cache strategies[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(4): 529-537.
[12] HU Tian-lei, CHEN Gang, LI Xiao-yan, DONG Jin-xiang. Automatic relational database compression scheme design based on swarm evolution[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(10): 4-.
[13] LIANG Hai-hua, ZHU Miao-liang. Applying the model driven generative domain engineering method to develop self-organizing architectural solutions for mobile robot[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(10): 5-.
[14] HU Hua, ZHANG Yang. A framework for Internet service evolution based on active object[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(10): 6-.
[15] WANG Mei-yuan, LU Yao-bin, ZHANG Jin-long. Software outsourcing risk management: establishing outsourcee evaluation item systems[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(6): 1092-1098.