Abstract
In proxy signature schemes, the proxy signer B is permitted to produce a signature on behalf of the original signer A. However, exposure of proxy signing keys can be the most devastating attack on a proxy signature scheme since any adversary can sign messages on behalf of the proxy signer. In this paper, we applied Dodis, et al.’s key-insulation mechanism and proposed an Identity-Based (ID-based) Key-Insulated Proxy Signature (IBKIPS) scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also supports unbounded period numbers and random-access key-updates.
Similar content being viewed by others
References
A. Shamir. Identity-based cryptosystems and signature schemes. Advances in Cryptology (Crypto’ 84), University of California, August 19–22, 1984, Vol. 196, 47–53.
K. G. Paterson. ID-based signatures from pairings on elliptic curves. IEEE Communications Letters, 38 (2002)18, 1025–1026.
J. C. Cha and J. H. Cheon. An identity-based signature from gap Diffie-Hellman groups. Public Key Cryptography (PKC’ 2003), Miami, FL, USA, January 6–8, 2003, Vol. 2567, 18–30.
F. Hess. Efficient identity based signature schemes based on pairings. ACM Symposium on Applied Computing (SAC’ 2002). Madrid, Spain, March 10–14, 2002, Vol. 2595, 310–324.
J. Horwitz and B. Lynn. Towards hierarchical identity-based encryption. Advances in Cryptology (Eurocrypt’ 2002), Amsterdam, April 28–May 2, 2002, Vol. 2332, 466–481.
M. Mambo, K. Usuda, and E. Okamoto. Proxy signature: delegation of the power to sign messages. IEICE Transactions on Fundamentals, E79-A(1996)9, 1338–1353.
A. Boldyreva, A. Palacio, and B. Warinschi. Secure proxy signature scheme for delegation of signing rights. IACR ePrint Archive, http://eprint.iacr.org/2003/096, 2003.
F. Zhang and K. Kim. Efficient ID-based blind signature and proxy signature from bilinear pairings. Proceedings of the 8th Australasia Conference on Information Security and Privacy (ACISP’2003), Wollongong, Australia, July 9–11, 2003, Vol. 2727, 312–323.
Y. Dodis, J. Katz, S. Xu, and M. Yung. Key-insulated public-key cryptosystems. Advances in Cryptology (Eurocrypt’ 2002), Amsterdam, April 28–May 2, 2002, Vol. 10, 65–82.
Z. Le, Y. Ouyang, J. Ford, and F. Makedon. A hierarchical key-insulated signature scheme in the CA trust model. Information Security (ISC’2004), Palo Alto, CA, USA, September 27–29, 2004, Vol. 3225, 280–291.
N. Gonzalez-Deleito, O. Markowitch, and E. DallOlio. A new key-insulated signature scheme. International Conference on Information and Communications Security (ICICS’2004), Krak’ow, Poland, June 6–9, 2004, Vol. 3269, 465–479.
J. Weng, K. F. Chen, S. L. Liu, and X. X. Li. Identity-based key-insulated signature with secure key updates. Information Security and Cryptology (Inscrypt’06), Beijing, China, November 29–December 1, Vol. 4318, 13–26.
J. Weng, S. L. Liu, K. F. Chen, and C. S. Ma. Identity-based key-insulated signature without random oracles. Computational Intelligence and Security (CIS’ 2006), Guangzhou, China, November 4–6, 2006, LNAI 4456, 470–480.
Y. Dodis, J. Katz, S. Xu, and M. Yung. Strong key-insulated signature schemes. Public Key Cryptography (PKC’ 2003), Miami, FL, USA, January 6–8, 2003, Vol. 2567, 130–144.
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported by the National Natural Science Foundation of China (No. 60573032, 60773092, 90604036, 60873229, 60903178, 60672072, 60832003) and Zhejiang Provincial Natural Science Foundation of China (No. Y106505).
Communication author: Wan Zhongmei, born in 1973, female, Lecturer.
About this article
Cite this article
Wan, Z., Lai, X., Weng, J. et al. Identity-based key-insulated proxy signature. J. Electron.(China) 26, 853–858 (2009). https://doi.org/10.1007/s11767-008-0128-2
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11767-008-0128-2