File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/s10207-010-0110-5
- Scopus: eid_2-s2.0-77955090387
- WOS: WOS:000280893000005
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: How to construct identity-based signatures without the key escrow problem
Title | How to construct identity-based signatures without the key escrow problem |
---|---|
Authors | |
Keywords | Certificateless signatures Key escrow Self-certificated signatures Certificate-based signatures Identity-based signatures |
Issue Date | 2010 |
Citation | International Journal of Information Security, 2010, v. 9, n. 4, p. 297-311 How to Cite? |
Abstract | The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by adopting multiple Private Key Generators (PKGs). Recently, there was a proposal that attempted to reduce the trust of the PKG by allowing a malicious PKG to be caught if he reveals the user's identity-based private key illegally. Nonetheless, the proposal does not consider that the PKG can simply decrypt the ciphertext instead of revealing the private key itself (in the case of identity-based encryption schemes). The aim of this paper is to present an escrow-free identity-based signature (IBS) scheme, in which the malicious PKG will be caught if it releases a signature on behalf of the user but signed by itself. We present a formal model to capture such a scheme and provide a concrete construction. © 2010 Springer-Verlag. |
Persistent Identifier | http://hdl.handle.net/10722/260198 |
ISSN | 2023 Impact Factor: 2.4 2023 SCImago Journal Rankings: 0.878 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yuen, Tsz Hon | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Mu, Yi | - |
dc.date.accessioned | 2018-09-12T02:00:42Z | - |
dc.date.available | 2018-09-12T02:00:42Z | - |
dc.date.issued | 2010 | - |
dc.identifier.citation | International Journal of Information Security, 2010, v. 9, n. 4, p. 297-311 | - |
dc.identifier.issn | 1615-5262 | - |
dc.identifier.uri | http://hdl.handle.net/10722/260198 | - |
dc.description.abstract | The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by adopting multiple Private Key Generators (PKGs). Recently, there was a proposal that attempted to reduce the trust of the PKG by allowing a malicious PKG to be caught if he reveals the user's identity-based private key illegally. Nonetheless, the proposal does not consider that the PKG can simply decrypt the ciphertext instead of revealing the private key itself (in the case of identity-based encryption schemes). The aim of this paper is to present an escrow-free identity-based signature (IBS) scheme, in which the malicious PKG will be caught if it releases a signature on behalf of the user but signed by itself. We present a formal model to capture such a scheme and provide a concrete construction. © 2010 Springer-Verlag. | - |
dc.language | eng | - |
dc.relation.ispartof | International Journal of Information Security | - |
dc.subject | Certificateless signatures | - |
dc.subject | Key escrow | - |
dc.subject | Self-certificated signatures | - |
dc.subject | Certificate-based signatures | - |
dc.subject | Identity-based signatures | - |
dc.title | How to construct identity-based signatures without the key escrow problem | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/s10207-010-0110-5 | - |
dc.identifier.scopus | eid_2-s2.0-77955090387 | - |
dc.identifier.volume | 9 | - |
dc.identifier.issue | 4 | - |
dc.identifier.spage | 297 | - |
dc.identifier.epage | 311 | - |
dc.identifier.eissn | 1615-5270 | - |
dc.identifier.isi | WOS:000280893000005 | - |
dc.identifier.issnl | 1615-5262 | - |