Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2007.14-C.6.463

Mediated ID based signature scheme and key updating signature scheme  

Ju, Hak-Soo (삼성전자 DM연구소)
Kim, Dae-Youb (삼성종합기술원 CNL.)
Abstract
Revocation is one of the main difficulties faced in implementing Public Key Infrastructures(PHs). Boneh, Ding and Tsudik first introduced a mediated cryptography for obtaining immediate revocation of RSA keys used in PKIs. Their method is based on the idea that each user's private key can be split into two random shares, one of which is given to the user and the other to an online security mediator(SEM). Thus any signature or decryption must be performed as a cooperation between a user and his/her associated SEM and revocation is achieved by instructing the mediator SEM to stop cooperating the user. Recently, Libert and Quisquater showed that the fast revocation method using a SEcurity Mediator(SEM) in a mRSA can be applied to the Boneh-Franklin identify based encryption and GDH signature schemes. In this paper we propose a mediated identity based signature(mIBS) with batch verification which apply the SEM architecture to an identity based signature. Libert's GDH siganture scheme is not forward secure even though forward security is an important and desirable feature for signature schemes. We propose an efficient key udating mediated signature scheme, mKUS based on mIBS and analyze its security and efficiency.
Keywords
Digital Signature; Mediator; Forward Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D.Boneh, X.Di ng, G. Tsudik, and C.M.W ong. 'A method for fast revocation of public key certificates and security capabilities.' In 10th USENIX Security Symposium, Washington, D.C. , Aug. 2001
2 D. Boneh and M. Franklin. 'Identity Based Encryption From the Weil Pairing,' In Advances in Cryptology-Proceedings of Crypto '01, volume 2139 of Lecture Notes in Computer Science, pages 213-229. Springer, 2001   DOI
3 H. Yoon, J. H. Cheon, and Y. Kim. 'Batch verifications with ID-based signatures.' In Information Security and Cryptology - ICISC 2004, pp. 233 - 248, 2005   DOI
4 Gene Itkis and Leonid Reyzin. 'Intrusion-resilient signatures, or towards obsoletion of certificate revocation,' In Moti Yung, editor, Advances in CryptologylCRYPTO 2002, Lecture Notes in Computer Science. Springer-Verlag, 18-22 August 2002
5 G. Tsudik, 'Weak Forward Security in Mediated RSA,' Security in Computer Networks Conference (SCN'02), September 2002   DOI
6 A. Boldyreva. 'Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme.' In Proceedings of PKC03, Lecture Notes in Computer Science. Springer, 2003   DOI
7 M. Bellare and A. Palacio, 'Protecting against key exposure: strong keyinsulated encryption with optimal threshold,' Cryptology ePrint archive 2002/064, http://eprint.iacr.org/, 2002
8 Dae Hyun Yum and Pil Joong Lee, 'Efficient Key Updating Signature Schemes based on IBS,' Cryptography and Coding 2003, pp. 167-182, 2003   DOI
9 Noel McCullagh, 'Efficient Batch Verification of Signature Schemes based on Bilinear Maps,' Cryptology ePrint archive 2004/088, http://eprint.iacr.org/complete/,2004.9
10 B. Libert, J.-J. Quisquater, 'Efficient revocation and threshold pairing based cryptosystems,' Symposium on Principles of Distributed Computing-PODC'2003, 2003   DOI
11 R. Anderson, 'Invited lecture at the acm conference on computer and communication security (CCS'97),' 1997
12 J. Katz and M. Yung. 'Threshold Cryptosystems Based on Factoring.' In Advances in Cryptology - proceedings of Asiacrypt 2002, Lecture Notes in Computer Science. Springer, 2002   DOI
13 D. Boneh, B. Lynn, and H. Shacham. 'Short signatures from the Weil pairing.' In Advances in Cryptology-Proceedings of Asiaerypt'01. volume 2248 of Lecture Notes in Computer Science, pages 514-532. Springer, 2001   DOI
14 X. Ding and G. Tsudik. 'Simple Identity-Based Cryptography with Mediated RSA.' In Proceedings of CT-RSA '03, Lecture Notes in Computer Science. Springer, 2003   DOI
15 Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, and Moti Yung. 'Key-insulated public key cryptosysterns.' In Lars Knudsen, editor, Advances in Cryptology, EUROCRYPT 2002, Lecture Notes in Computer Science. Springer-Verlag, 28 April May 2002