Parallel key-insulated public key encryption

被引:0
|
作者
Hanaoka, Goichiro
Hanaoka, Yumiko
Imai, Hideki
机构
[1] Natl Inst Adv Ind Sci & Technol, Res Ctr Informat Secur, Chiyoda Ku, Tokyo 1010021, Japan
[2] NTT DoCoMo Inc, Yokosuka, Kanagawa 2398536, Japan
[3] Univ Tokyo, Inst Ind Sci, Meguro Ku, Tokyo 1538505, Japan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is constantly been infringed by inadvertent loss of secret keys, and as a solution, Dodis, Katz, Xu, and Yung [11], in Eurocrypt 2002, proposed a new paradigm called key-insulated security which provides tolerance against key exposures. Their scheme introduces a "helper key" which is used to periodically update the decryption key. The most attractive part of this scheme is that even if a decryption key of a time period is exposed, the security of the rest of the periods are unaffected. But how does this helper key managed? Can it be done efficiently? As, to alleviate the damage caused by key exposures, decryption key has to be updated at very short intervals, although frequent updating will, in contrary, increase the risk of helper key exposure. In this paper, we propose parallel key-insulated public key encryption in which two distinct helper keys alternately update a decryption key. The helper key of one system is independent from the other. Not only does it decrease the chance of helper key exposures, it also allows frequent updating of the decryption key, and over all, increases the security of the system.
引用
收藏
页码:105 / 122
页数:18
相关论文
共 50 条
  • [21] Attribute-Based Parallel Key-Insulated Signature
    Chen, Jianhong
    Yu, Kun
    Long, Yu
    Chen, Kefei
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (03) : 26 - 40
  • [22] Identity based key-insulated encryption with outsourced equality test
    Alornyo, Seth
    Zhao, Yanan
    Zhu, Guobin
    Xiong, Hu
    International Journal of Network Security, 2020, 22 (02) : 257 - 264
  • [23] Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
    Mihir Bellare
    Adriana Palacio
    Applicable Algebra in Engineering, Communication and Computing, 2006, 16 : 379 - 396
  • [24] Identity-Based Parallel Key-Insulated Encryption with Multiple Long-Term Keys
    Ren, Yanli
    Wang, Shuozhong
    Zhang, Xinpeng
    Qian, Zhenxing
    PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 277 - 283
  • [25] Identity-Based Parallel Key-Insulated Encryption with Multiple Long-Term Keys
    Ren, Yanli
    Wang, Shuozhong
    Zhang, Xinpeng
    Qian, Zhenxing
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 376 - 379
  • [26] Key-insulated aggregate signature
    Zhao, Huiyan
    Yu, Jia
    Duan, Shaoxia
    Cheng, Xiangguo
    Hao, Rong
    FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (05) : 837 - 846
  • [27] A survey of key-insulated cryptography
    Qin, Zhi-Guang
    Liu, Jing-Jing
    Zhao, Yang
    Wu, Song-Yang
    Xiong, Hu
    Nie, Xu-Yun
    Zhu, Guo-Bin
    Jisuanji Xuebao/Chinese Journal of Computers, 2015, 38 (04): : 759 - 774
  • [28] Pairing-Free Certificateless Key-Insulated Encryption with Provable Security
    Li-Bo He
    Dong-Jie Yan
    Hu Xiong
    Zhi-Guang Qin
    Journal of Electronic Science and Technology, 2018, 16 (01) : 50 - 56
  • [29] Identity-based parallel key-insulated encryption without random oracles: Security notions and construction
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, Changshe
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 409 - +
  • [30] Parallel key-insulated signature scheme without random oracles
    1600, Korean Institute of Communications and Information Sciences (15):