z-logo
Premium
Provably secure certificate‐based key‐insulated signature scheme
Author(s) -
Li Jiguo,
Du Haiting,
Zhang Yichen,
Li Tao,
Zhang Yuexin
Publication year - 2013
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.3019
Subject(s) - random oracle , key (lock) , computer science , certificate , schnorr signature , signature (topology) , scheme (mathematics) , computer security , cryptography , public key cryptography , implicit certificate , digital signature , oracle , certificate authority , merkle signature scheme , theoretical computer science , blind signature , encryption , mathematics , hash function , software engineering , mathematical analysis , geometry
SUMMARY Certificate‐based signature computation is often performed on insecure devices where the signature key is easy to be exposed. To reduce the influence of key exposure, we introduce key‐insulated mechanism into certificate‐based cryptography and formalize the notion and security model of the certificate‐based key‐insulated signature scheme. We then present a certificate‐based key‐insulated signature scheme, which is proven to be existentially unforgeable against adaptive chosen message attacks in the random oracle model. The proposed scheme has potential applications in trusted computing. Copyright © 2013 John Wiley & Sons, Ltd.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here