File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: How to construct identity-based signatures without the key escrow problem

TitleHow to construct identity-based signatures without the key escrow problem
Authors
KeywordsCertificateless signatures
Key escrow
Self-certificated signatures
Certificate-based signatures
Identity-based signatures
Issue Date2010
Citation
International Journal of Information Security, 2010, v. 9, n. 4, p. 297-311 How to Cite?
AbstractThe inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by adopting multiple Private Key Generators (PKGs). Recently, there was a proposal that attempted to reduce the trust of the PKG by allowing a malicious PKG to be caught if he reveals the user's identity-based private key illegally. Nonetheless, the proposal does not consider that the PKG can simply decrypt the ciphertext instead of revealing the private key itself (in the case of identity-based encryption schemes). The aim of this paper is to present an escrow-free identity-based signature (IBS) scheme, in which the malicious PKG will be caught if it releases a signature on behalf of the user but signed by itself. We present a formal model to capture such a scheme and provide a concrete construction. © 2010 Springer-Verlag.
Persistent Identifierhttp://hdl.handle.net/10722/260198
ISSN
2023 Impact Factor: 2.4
2023 SCImago Journal Rankings: 0.878
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorYuen, Tsz Hon-
dc.contributor.authorSusilo, Willy-
dc.contributor.authorMu, Yi-
dc.date.accessioned2018-09-12T02:00:42Z-
dc.date.available2018-09-12T02:00:42Z-
dc.date.issued2010-
dc.identifier.citationInternational Journal of Information Security, 2010, v. 9, n. 4, p. 297-311-
dc.identifier.issn1615-5262-
dc.identifier.urihttp://hdl.handle.net/10722/260198-
dc.description.abstractThe inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by adopting multiple Private Key Generators (PKGs). Recently, there was a proposal that attempted to reduce the trust of the PKG by allowing a malicious PKG to be caught if he reveals the user's identity-based private key illegally. Nonetheless, the proposal does not consider that the PKG can simply decrypt the ciphertext instead of revealing the private key itself (in the case of identity-based encryption schemes). The aim of this paper is to present an escrow-free identity-based signature (IBS) scheme, in which the malicious PKG will be caught if it releases a signature on behalf of the user but signed by itself. We present a formal model to capture such a scheme and provide a concrete construction. © 2010 Springer-Verlag.-
dc.languageeng-
dc.relation.ispartofInternational Journal of Information Security-
dc.subjectCertificateless signatures-
dc.subjectKey escrow-
dc.subjectSelf-certificated signatures-
dc.subjectCertificate-based signatures-
dc.subjectIdentity-based signatures-
dc.titleHow to construct identity-based signatures without the key escrow problem-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/s10207-010-0110-5-
dc.identifier.scopuseid_2-s2.0-77955090387-
dc.identifier.volume9-
dc.identifier.issue4-
dc.identifier.spage297-
dc.identifier.epage311-
dc.identifier.eissn1615-5270-
dc.identifier.isiWOS:000280893000005-
dc.identifier.issnl1615-5262-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats