ID-based key-insulated signature scheme with batch verifications and its novel application

Tsu Yang Wu, Yuh-Min Tseng, Ching Wen Yu

Research output: Contribution to journalArticle

10 Citations (Scopus)

Abstract

For a digital signature scheme, loss of private keys will cause a devastating effect on e-commerce and Internet-based transaction applications in the present network environment. Key-insulated public-key system is introduced to reduce damage caused by private key exposure. Over the last few years, identity (ID)-based key-insulated cryptography using bilinear pairings has received much attention from cryptographic researchers. In this paper, we propose a new and efficient ID-based key-insulated signature scheme with batch verifications. As compared with the recently proposed ID-based key-insulated signature schemes, our scheme has the best performance for batch verifications. For security analysis, we demonstrate that the proposed scheme is a provably secure ID-based key-insulated signature in the random oracle model and under the computational Diffie-Hellman assumptionn. Meanwhile, to demonstrate the additional advantage of our ID-based key-insulated signature scheme, we present a novel application based on the proposed scheme, called ID-based proxy signature scheme with full delegation and time restriction. This new type of proxy signature scheme provides flexible management for the delegated proxy signers.

Original languageEnglish
Pages (from-to)4797-4810
Number of pages14
JournalInternational Journal of Innovative Computing, Information and Control
Volume8
Issue number7 A
Publication statusPublished - 2012 Jul 1

Fingerprint

Identity-based
Signature Scheme
Batch
Electronic document identification systems
Cryptography
Internet
Proxy Signature
Identity-based Signature
Bilinear Pairings
Delegation
Digital Signature
Security Analysis
Random Oracle Model
Diffie-Hellman
Public key
Electronic Commerce
Demonstrate
Transactions
Signature
Damage

All Science Journal Classification (ASJC) codes

  • Software
  • Theoretical Computer Science
  • Information Systems
  • Computational Theory and Mathematics

Cite this

@article{e3a134398d4541b28981b2882a150f59,
title = "ID-based key-insulated signature scheme with batch verifications and its novel application",
abstract = "For a digital signature scheme, loss of private keys will cause a devastating effect on e-commerce and Internet-based transaction applications in the present network environment. Key-insulated public-key system is introduced to reduce damage caused by private key exposure. Over the last few years, identity (ID)-based key-insulated cryptography using bilinear pairings has received much attention from cryptographic researchers. In this paper, we propose a new and efficient ID-based key-insulated signature scheme with batch verifications. As compared with the recently proposed ID-based key-insulated signature schemes, our scheme has the best performance for batch verifications. For security analysis, we demonstrate that the proposed scheme is a provably secure ID-based key-insulated signature in the random oracle model and under the computational Diffie-Hellman assumptionn. Meanwhile, to demonstrate the additional advantage of our ID-based key-insulated signature scheme, we present a novel application based on the proposed scheme, called ID-based proxy signature scheme with full delegation and time restriction. This new type of proxy signature scheme provides flexible management for the delegated proxy signers.",
author = "Wu, {Tsu Yang} and Yuh-Min Tseng and Yu, {Ching Wen}",
year = "2012",
month = "7",
day = "1",
language = "English",
volume = "8",
pages = "4797--4810",
journal = "International Journal of Innovative Computing, Information and Control",
issn = "1349-4198",
publisher = "IJICIC Editorial Office",
number = "7 A",

}

ID-based key-insulated signature scheme with batch verifications and its novel application. / Wu, Tsu Yang; Tseng, Yuh-Min; Yu, Ching Wen.

In: International Journal of Innovative Computing, Information and Control, Vol. 8, No. 7 A, 01.07.2012, p. 4797-4810.

Research output: Contribution to journalArticle

TY - JOUR

T1 - ID-based key-insulated signature scheme with batch verifications and its novel application

AU - Wu, Tsu Yang

AU - Tseng, Yuh-Min

AU - Yu, Ching Wen

PY - 2012/7/1

Y1 - 2012/7/1

N2 - For a digital signature scheme, loss of private keys will cause a devastating effect on e-commerce and Internet-based transaction applications in the present network environment. Key-insulated public-key system is introduced to reduce damage caused by private key exposure. Over the last few years, identity (ID)-based key-insulated cryptography using bilinear pairings has received much attention from cryptographic researchers. In this paper, we propose a new and efficient ID-based key-insulated signature scheme with batch verifications. As compared with the recently proposed ID-based key-insulated signature schemes, our scheme has the best performance for batch verifications. For security analysis, we demonstrate that the proposed scheme is a provably secure ID-based key-insulated signature in the random oracle model and under the computational Diffie-Hellman assumptionn. Meanwhile, to demonstrate the additional advantage of our ID-based key-insulated signature scheme, we present a novel application based on the proposed scheme, called ID-based proxy signature scheme with full delegation and time restriction. This new type of proxy signature scheme provides flexible management for the delegated proxy signers.

AB - For a digital signature scheme, loss of private keys will cause a devastating effect on e-commerce and Internet-based transaction applications in the present network environment. Key-insulated public-key system is introduced to reduce damage caused by private key exposure. Over the last few years, identity (ID)-based key-insulated cryptography using bilinear pairings has received much attention from cryptographic researchers. In this paper, we propose a new and efficient ID-based key-insulated signature scheme with batch verifications. As compared with the recently proposed ID-based key-insulated signature schemes, our scheme has the best performance for batch verifications. For security analysis, we demonstrate that the proposed scheme is a provably secure ID-based key-insulated signature in the random oracle model and under the computational Diffie-Hellman assumptionn. Meanwhile, to demonstrate the additional advantage of our ID-based key-insulated signature scheme, we present a novel application based on the proposed scheme, called ID-based proxy signature scheme with full delegation and time restriction. This new type of proxy signature scheme provides flexible management for the delegated proxy signers.

UR - http://www.scopus.com/inward/record.url?scp=84862329052&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84862329052&partnerID=8YFLogxK

M3 - Article

VL - 8

SP - 4797

EP - 4810

JO - International Journal of Innovative Computing, Information and Control

JF - International Journal of Innovative Computing, Information and Control

SN - 1349-4198

IS - 7 A

ER -