Skip to main content
Log in

Identity-based key-insulated proxy signature

  • Published:
Journal of Electronics (China)

Abstract

In proxy signature schemes, the proxy signer B is permitted to produce a signature on behalf of the original signer A. However, exposure of proxy signing keys can be the most devastating attack on a proxy signature scheme since any adversary can sign messages on behalf of the proxy signer. In this paper, we applied Dodis, et al.’s key-insulation mechanism and proposed an Identity-Based (ID-based) Key-Insulated Proxy Signature (IBKIPS) scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also supports unbounded period numbers and random-access key-updates.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. A. Shamir. Identity-based cryptosystems and signature schemes. Advances in Cryptology (Crypto’ 84), University of California, August 19–22, 1984, Vol. 196, 47–53.

  2. K. G. Paterson. ID-based signatures from pairings on elliptic curves. IEEE Communications Letters, 38 (2002)18, 1025–1026.

    Google Scholar 

  3. J. C. Cha and J. H. Cheon. An identity-based signature from gap Diffie-Hellman groups. Public Key Cryptography (PKC’ 2003), Miami, FL, USA, January 6–8, 2003, Vol. 2567, 18–30.

  4. F. Hess. Efficient identity based signature schemes based on pairings. ACM Symposium on Applied Computing (SAC’ 2002). Madrid, Spain, March 10–14, 2002, Vol. 2595, 310–324.

  5. J. Horwitz and B. Lynn. Towards hierarchical identity-based encryption. Advances in Cryptology (Eurocrypt’ 2002), Amsterdam, April 28–May 2, 2002, Vol. 2332, 466–481.

  6. M. Mambo, K. Usuda, and E. Okamoto. Proxy signature: delegation of the power to sign messages. IEICE Transactions on Fundamentals, E79-A(1996)9, 1338–1353.

    Google Scholar 

  7. A. Boldyreva, A. Palacio, and B. Warinschi. Secure proxy signature scheme for delegation of signing rights. IACR ePrint Archive, http://eprint.iacr.org/2003/096, 2003.

  8. F. Zhang and K. Kim. Efficient ID-based blind signature and proxy signature from bilinear pairings. Proceedings of the 8th Australasia Conference on Information Security and Privacy (ACISP’2003), Wollongong, Australia, July 9–11, 2003, Vol. 2727, 312–323.

  9. Y. Dodis, J. Katz, S. Xu, and M. Yung. Key-insulated public-key cryptosystems. Advances in Cryptology (Eurocrypt’ 2002), Amsterdam, April 28–May 2, 2002, Vol. 10, 65–82.

  10. Z. Le, Y. Ouyang, J. Ford, and F. Makedon. A hierarchical key-insulated signature scheme in the CA trust model. Information Security (ISC’2004), Palo Alto, CA, USA, September 27–29, 2004, Vol. 3225, 280–291.

  11. N. Gonzalez-Deleito, O. Markowitch, and E. DallOlio. A new key-insulated signature scheme. International Conference on Information and Communications Security (ICICS’2004), Krak’ow, Poland, June 6–9, 2004, Vol. 3269, 465–479.

  12. J. Weng, K. F. Chen, S. L. Liu, and X. X. Li. Identity-based key-insulated signature with secure key updates. Information Security and Cryptology (Inscrypt’06), Beijing, China, November 29–December 1, Vol. 4318, 13–26.

  13. J. Weng, S. L. Liu, K. F. Chen, and C. S. Ma. Identity-based key-insulated signature without random oracles. Computational Intelligence and Security (CIS’ 2006), Guangzhou, China, November 4–6, 2006, LNAI 4456, 470–480.

  14. Y. Dodis, J. Katz, S. Xu, and M. Yung. Strong key-insulated signature schemes. Public Key Cryptography (PKC’ 2003), Miami, FL, USA, January 6–8, 2003, Vol. 2567, 130–144.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhongmei Wan.

Additional information

Supported by the National Natural Science Foundation of China (No. 60573032, 60773092, 90604036, 60873229, 60903178, 60672072, 60832003) and Zhejiang Provincial Natural Science Foundation of China (No. Y106505).

Communication author: Wan Zhongmei, born in 1973, female, Lecturer.

About this article

Cite this article

Wan, Z., Lai, X., Weng, J. et al. Identity-based key-insulated proxy signature. J. Electron.(China) 26, 853–858 (2009). https://doi.org/10.1007/s11767-008-0128-2

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11767-008-0128-2

Key words

CLC index

Navigation