Leakage-free ID-Based Signature, Revisited
Abstract Recently, Tseng et al. proposed a new notion for identity-based signature (IBS) scheme to resist ephemeral secret leakage (ESL) attacks, called leakage-free identity-based signature (leakage-free IBS), and devised the first secure leakage-free IBS scheme. However, they only considered the s...
Gespeichert in:
Veröffentlicht in: | Computer journal 2020-08, Vol.63 (8), p.1263-1270 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1270 |
---|---|
container_issue | 8 |
container_start_page | 1263 |
container_title | Computer journal |
container_volume | 63 |
creator | Lin, Xi-Jun Sun, Lin Qu, Haipeng |
description | Abstract
Recently, Tseng et al. proposed a new notion for identity-based signature (IBS) scheme to resist ephemeral secret leakage (ESL) attacks, called leakage-free identity-based signature (leakage-free IBS), and devised the first secure leakage-free IBS scheme. However, they only considered the situation of the leakage of ephemeral secrets used for generating the signatures. Notice that the private key extraction procedure is probabilistic as well in their scheme, that is, there are ephemeral secrets used by the key generation center to generate the signers’ private keys. It is practical to consider that if the adversary comprises these ephemeral secrets, then he can reveal the master key of the system. Therefore, it is desired to introduce a new security notion for the leakage-free IBS schemes to consider the ESL attacks on both private key extraction and signing procedures. In this paper, we present such security notion. Moreover, we propose two IBS schemes that are proved to be secure under the new security notion. |
doi_str_mv | 10.1093/comjnl/bxz160 |
format | Article |
fullrecord | <record><control><sourceid>oup_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1093_comjnl_bxz160</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><oup_id>10.1093/comjnl/bxz160</oup_id><sourcerecordid>10.1093/comjnl/bxz160</sourcerecordid><originalsourceid>FETCH-LOGICAL-c226t-4205a6c877131a2a0a026d60aac09b90e297e9e0378d56991499fbf1a38f3a193</originalsourceid><addsrcrecordid>eNqFz81Lw0AQxuFFFKzVo_ccRVw7s5tuMketX4WA4Mc5TJLZkto2ZTcV9a9XiXdP7-XhhZ9SpwiXCGQndbdeblaT6uMLHeypEaYOtAGX7asRAIJOnYFDdRTjEgAMkBup80L4jReifRBJ5jf6mqM0yXO72HC_C3KRPMl7G9temmN14HkV5eRvx-r17vZl9qCLx_v57KrQtTGu16mBKbs6zzK0yIaBwbjGAXMNVBGIoUxIwGZ5M3VEmBL5yiPb3FtGsmOlh986dDEG8eU2tGsOnyVC-RtaDqHlEPrjzwbf7bb_0G-A1VRo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Leakage-free ID-Based Signature, Revisited</title><source>Oxford University Press Journals All Titles (1996-Current)</source><creator>Lin, Xi-Jun ; Sun, Lin ; Qu, Haipeng</creator><contributor>Liang, Kaitai</contributor><creatorcontrib>Lin, Xi-Jun ; Sun, Lin ; Qu, Haipeng ; Liang, Kaitai</creatorcontrib><description>Abstract
Recently, Tseng et al. proposed a new notion for identity-based signature (IBS) scheme to resist ephemeral secret leakage (ESL) attacks, called leakage-free identity-based signature (leakage-free IBS), and devised the first secure leakage-free IBS scheme. However, they only considered the situation of the leakage of ephemeral secrets used for generating the signatures. Notice that the private key extraction procedure is probabilistic as well in their scheme, that is, there are ephemeral secrets used by the key generation center to generate the signers’ private keys. It is practical to consider that if the adversary comprises these ephemeral secrets, then he can reveal the master key of the system. Therefore, it is desired to introduce a new security notion for the leakage-free IBS schemes to consider the ESL attacks on both private key extraction and signing procedures. In this paper, we present such security notion. Moreover, we propose two IBS schemes that are proved to be secure under the new security notion.</description><identifier>ISSN: 0010-4620</identifier><identifier>EISSN: 1460-2067</identifier><identifier>DOI: 10.1093/comjnl/bxz160</identifier><language>eng</language><publisher>Oxford University Press</publisher><ispartof>Computer journal, 2020-08, Vol.63 (8), p.1263-1270</ispartof><rights>The British Computer Society 2020. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c226t-4205a6c877131a2a0a026d60aac09b90e297e9e0378d56991499fbf1a38f3a193</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,1584,27924,27925</link.rule.ids></links><search><contributor>Liang, Kaitai</contributor><creatorcontrib>Lin, Xi-Jun</creatorcontrib><creatorcontrib>Sun, Lin</creatorcontrib><creatorcontrib>Qu, Haipeng</creatorcontrib><title>Leakage-free ID-Based Signature, Revisited</title><title>Computer journal</title><description>Abstract
Recently, Tseng et al. proposed a new notion for identity-based signature (IBS) scheme to resist ephemeral secret leakage (ESL) attacks, called leakage-free identity-based signature (leakage-free IBS), and devised the first secure leakage-free IBS scheme. However, they only considered the situation of the leakage of ephemeral secrets used for generating the signatures. Notice that the private key extraction procedure is probabilistic as well in their scheme, that is, there are ephemeral secrets used by the key generation center to generate the signers’ private keys. It is practical to consider that if the adversary comprises these ephemeral secrets, then he can reveal the master key of the system. Therefore, it is desired to introduce a new security notion for the leakage-free IBS schemes to consider the ESL attacks on both private key extraction and signing procedures. In this paper, we present such security notion. Moreover, we propose two IBS schemes that are proved to be secure under the new security notion.</description><issn>0010-4620</issn><issn>1460-2067</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNqFz81Lw0AQxuFFFKzVo_ccRVw7s5tuMketX4WA4Mc5TJLZkto2ZTcV9a9XiXdP7-XhhZ9SpwiXCGQndbdeblaT6uMLHeypEaYOtAGX7asRAIJOnYFDdRTjEgAMkBup80L4jReifRBJ5jf6mqM0yXO72HC_C3KRPMl7G9temmN14HkV5eRvx-r17vZl9qCLx_v57KrQtTGu16mBKbs6zzK0yIaBwbjGAXMNVBGIoUxIwGZ5M3VEmBL5yiPb3FtGsmOlh986dDEG8eU2tGsOnyVC-RtaDqHlEPrjzwbf7bb_0G-A1VRo</recordid><startdate>20200820</startdate><enddate>20200820</enddate><creator>Lin, Xi-Jun</creator><creator>Sun, Lin</creator><creator>Qu, Haipeng</creator><general>Oxford University Press</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20200820</creationdate><title>Leakage-free ID-Based Signature, Revisited</title><author>Lin, Xi-Jun ; Sun, Lin ; Qu, Haipeng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c226t-4205a6c877131a2a0a026d60aac09b90e297e9e0378d56991499fbf1a38f3a193</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lin, Xi-Jun</creatorcontrib><creatorcontrib>Sun, Lin</creatorcontrib><creatorcontrib>Qu, Haipeng</creatorcontrib><collection>CrossRef</collection><jtitle>Computer journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lin, Xi-Jun</au><au>Sun, Lin</au><au>Qu, Haipeng</au><au>Liang, Kaitai</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Leakage-free ID-Based Signature, Revisited</atitle><jtitle>Computer journal</jtitle><date>2020-08-20</date><risdate>2020</risdate><volume>63</volume><issue>8</issue><spage>1263</spage><epage>1270</epage><pages>1263-1270</pages><issn>0010-4620</issn><eissn>1460-2067</eissn><abstract>Abstract
Recently, Tseng et al. proposed a new notion for identity-based signature (IBS) scheme to resist ephemeral secret leakage (ESL) attacks, called leakage-free identity-based signature (leakage-free IBS), and devised the first secure leakage-free IBS scheme. However, they only considered the situation of the leakage of ephemeral secrets used for generating the signatures. Notice that the private key extraction procedure is probabilistic as well in their scheme, that is, there are ephemeral secrets used by the key generation center to generate the signers’ private keys. It is practical to consider that if the adversary comprises these ephemeral secrets, then he can reveal the master key of the system. Therefore, it is desired to introduce a new security notion for the leakage-free IBS schemes to consider the ESL attacks on both private key extraction and signing procedures. In this paper, we present such security notion. Moreover, we propose two IBS schemes that are proved to be secure under the new security notion.</abstract><pub>Oxford University Press</pub><doi>10.1093/comjnl/bxz160</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0010-4620 |
ispartof | Computer journal, 2020-08, Vol.63 (8), p.1263-1270 |
issn | 0010-4620 1460-2067 |
language | eng |
recordid | cdi_crossref_primary_10_1093_comjnl_bxz160 |
source | Oxford University Press Journals All Titles (1996-Current) |
title | Leakage-free ID-Based Signature, Revisited |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T12%3A05%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-oup_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Leakage-free%20ID-Based%20Signature,%20Revisited&rft.jtitle=Computer%20journal&rft.au=Lin,%20Xi-Jun&rft.date=2020-08-20&rft.volume=63&rft.issue=8&rft.spage=1263&rft.epage=1270&rft.pages=1263-1270&rft.issn=0010-4620&rft.eissn=1460-2067&rft_id=info:doi/10.1093/comjnl/bxz160&rft_dat=%3Coup_cross%3E10.1093/comjnl/bxz160%3C/oup_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_oup_id=10.1093/comjnl/bxz160&rfr_iscdi=true |