Leakage-free ID-Based Signature, Revisited

Abstract Recently, Tseng et al. proposed a new notion for identity-based signature (IBS) scheme to resist ephemeral secret leakage (ESL) attacks, called leakage-free identity-based signature (leakage-free IBS), and devised the first secure leakage-free IBS scheme. However, they only considered the s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computer journal 2020-08, Vol.63 (8), p.1263-1270
Hauptverfasser: Lin, Xi-Jun, Sun, Lin, Qu, Haipeng
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1270
container_issue 8
container_start_page 1263
container_title Computer journal
container_volume 63
creator Lin, Xi-Jun
Sun, Lin
Qu, Haipeng
description Abstract Recently, Tseng et al. proposed a new notion for identity-based signature (IBS) scheme to resist ephemeral secret leakage (ESL) attacks, called leakage-free identity-based signature (leakage-free IBS), and devised the first secure leakage-free IBS scheme. However, they only considered the situation of the leakage of ephemeral secrets used for generating the signatures. Notice that the private key extraction procedure is probabilistic as well in their scheme, that is, there are ephemeral secrets used by the key generation center to generate the signers’ private keys. It is practical to consider that if the adversary comprises these ephemeral secrets, then he can reveal the master key of the system. Therefore, it is desired to introduce a new security notion for the leakage-free IBS schemes to consider the ESL attacks on both private key extraction and signing procedures. In this paper, we present such security notion. Moreover, we propose two IBS schemes that are proved to be secure under the new security notion.
doi_str_mv 10.1093/comjnl/bxz160
format Article
fullrecord <record><control><sourceid>oup_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1093_comjnl_bxz160</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><oup_id>10.1093/comjnl/bxz160</oup_id><sourcerecordid>10.1093/comjnl/bxz160</sourcerecordid><originalsourceid>FETCH-LOGICAL-c226t-4205a6c877131a2a0a026d60aac09b90e297e9e0378d56991499fbf1a38f3a193</originalsourceid><addsrcrecordid>eNqFz81Lw0AQxuFFFKzVo_ccRVw7s5tuMketX4WA4Mc5TJLZkto2ZTcV9a9XiXdP7-XhhZ9SpwiXCGQndbdeblaT6uMLHeypEaYOtAGX7asRAIJOnYFDdRTjEgAMkBup80L4jReifRBJ5jf6mqM0yXO72HC_C3KRPMl7G9temmN14HkV5eRvx-r17vZl9qCLx_v57KrQtTGu16mBKbs6zzK0yIaBwbjGAXMNVBGIoUxIwGZ5M3VEmBL5yiPb3FtGsmOlh986dDEG8eU2tGsOnyVC-RtaDqHlEPrjzwbf7bb_0G-A1VRo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Leakage-free ID-Based Signature, Revisited</title><source>Oxford University Press Journals All Titles (1996-Current)</source><creator>Lin, Xi-Jun ; Sun, Lin ; Qu, Haipeng</creator><contributor>Liang, Kaitai</contributor><creatorcontrib>Lin, Xi-Jun ; Sun, Lin ; Qu, Haipeng ; Liang, Kaitai</creatorcontrib><description>Abstract Recently, Tseng et al. proposed a new notion for identity-based signature (IBS) scheme to resist ephemeral secret leakage (ESL) attacks, called leakage-free identity-based signature (leakage-free IBS), and devised the first secure leakage-free IBS scheme. However, they only considered the situation of the leakage of ephemeral secrets used for generating the signatures. Notice that the private key extraction procedure is probabilistic as well in their scheme, that is, there are ephemeral secrets used by the key generation center to generate the signers’ private keys. It is practical to consider that if the adversary comprises these ephemeral secrets, then he can reveal the master key of the system. Therefore, it is desired to introduce a new security notion for the leakage-free IBS schemes to consider the ESL attacks on both private key extraction and signing procedures. In this paper, we present such security notion. Moreover, we propose two IBS schemes that are proved to be secure under the new security notion.</description><identifier>ISSN: 0010-4620</identifier><identifier>EISSN: 1460-2067</identifier><identifier>DOI: 10.1093/comjnl/bxz160</identifier><language>eng</language><publisher>Oxford University Press</publisher><ispartof>Computer journal, 2020-08, Vol.63 (8), p.1263-1270</ispartof><rights>The British Computer Society 2020. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c226t-4205a6c877131a2a0a026d60aac09b90e297e9e0378d56991499fbf1a38f3a193</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,1584,27924,27925</link.rule.ids></links><search><contributor>Liang, Kaitai</contributor><creatorcontrib>Lin, Xi-Jun</creatorcontrib><creatorcontrib>Sun, Lin</creatorcontrib><creatorcontrib>Qu, Haipeng</creatorcontrib><title>Leakage-free ID-Based Signature, Revisited</title><title>Computer journal</title><description>Abstract Recently, Tseng et al. proposed a new notion for identity-based signature (IBS) scheme to resist ephemeral secret leakage (ESL) attacks, called leakage-free identity-based signature (leakage-free IBS), and devised the first secure leakage-free IBS scheme. However, they only considered the situation of the leakage of ephemeral secrets used for generating the signatures. Notice that the private key extraction procedure is probabilistic as well in their scheme, that is, there are ephemeral secrets used by the key generation center to generate the signers’ private keys. It is practical to consider that if the adversary comprises these ephemeral secrets, then he can reveal the master key of the system. Therefore, it is desired to introduce a new security notion for the leakage-free IBS schemes to consider the ESL attacks on both private key extraction and signing procedures. In this paper, we present such security notion. Moreover, we propose two IBS schemes that are proved to be secure under the new security notion.</description><issn>0010-4620</issn><issn>1460-2067</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNqFz81Lw0AQxuFFFKzVo_ccRVw7s5tuMketX4WA4Mc5TJLZkto2ZTcV9a9XiXdP7-XhhZ9SpwiXCGQndbdeblaT6uMLHeypEaYOtAGX7asRAIJOnYFDdRTjEgAMkBup80L4jReifRBJ5jf6mqM0yXO72HC_C3KRPMl7G9temmN14HkV5eRvx-r17vZl9qCLx_v57KrQtTGu16mBKbs6zzK0yIaBwbjGAXMNVBGIoUxIwGZ5M3VEmBL5yiPb3FtGsmOlh986dDEG8eU2tGsOnyVC-RtaDqHlEPrjzwbf7bb_0G-A1VRo</recordid><startdate>20200820</startdate><enddate>20200820</enddate><creator>Lin, Xi-Jun</creator><creator>Sun, Lin</creator><creator>Qu, Haipeng</creator><general>Oxford University Press</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20200820</creationdate><title>Leakage-free ID-Based Signature, Revisited</title><author>Lin, Xi-Jun ; Sun, Lin ; Qu, Haipeng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c226t-4205a6c877131a2a0a026d60aac09b90e297e9e0378d56991499fbf1a38f3a193</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lin, Xi-Jun</creatorcontrib><creatorcontrib>Sun, Lin</creatorcontrib><creatorcontrib>Qu, Haipeng</creatorcontrib><collection>CrossRef</collection><jtitle>Computer journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lin, Xi-Jun</au><au>Sun, Lin</au><au>Qu, Haipeng</au><au>Liang, Kaitai</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Leakage-free ID-Based Signature, Revisited</atitle><jtitle>Computer journal</jtitle><date>2020-08-20</date><risdate>2020</risdate><volume>63</volume><issue>8</issue><spage>1263</spage><epage>1270</epage><pages>1263-1270</pages><issn>0010-4620</issn><eissn>1460-2067</eissn><abstract>Abstract Recently, Tseng et al. proposed a new notion for identity-based signature (IBS) scheme to resist ephemeral secret leakage (ESL) attacks, called leakage-free identity-based signature (leakage-free IBS), and devised the first secure leakage-free IBS scheme. However, they only considered the situation of the leakage of ephemeral secrets used for generating the signatures. Notice that the private key extraction procedure is probabilistic as well in their scheme, that is, there are ephemeral secrets used by the key generation center to generate the signers’ private keys. It is practical to consider that if the adversary comprises these ephemeral secrets, then he can reveal the master key of the system. Therefore, it is desired to introduce a new security notion for the leakage-free IBS schemes to consider the ESL attacks on both private key extraction and signing procedures. In this paper, we present such security notion. Moreover, we propose two IBS schemes that are proved to be secure under the new security notion.</abstract><pub>Oxford University Press</pub><doi>10.1093/comjnl/bxz160</doi><tpages>8</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0010-4620
ispartof Computer journal, 2020-08, Vol.63 (8), p.1263-1270
issn 0010-4620
1460-2067
language eng
recordid cdi_crossref_primary_10_1093_comjnl_bxz160
source Oxford University Press Journals All Titles (1996-Current)
title Leakage-free ID-Based Signature, Revisited
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T12%3A05%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-oup_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Leakage-free%20ID-Based%20Signature,%20Revisited&rft.jtitle=Computer%20journal&rft.au=Lin,%20Xi-Jun&rft.date=2020-08-20&rft.volume=63&rft.issue=8&rft.spage=1263&rft.epage=1270&rft.pages=1263-1270&rft.issn=0010-4620&rft.eissn=1460-2067&rft_id=info:doi/10.1093/comjnl/bxz160&rft_dat=%3Coup_cross%3E10.1093/comjnl/bxz160%3C/oup_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_oup_id=10.1093/comjnl/bxz160&rfr_iscdi=true