Parallel key-insulated public key encryption

被引:0
|
作者
Hanaoka, Goichiro
Hanaoka, Yumiko
Imai, Hideki
机构
[1] Natl Inst Adv Ind Sci & Technol, Res Ctr Informat Secur, Chiyoda Ku, Tokyo 1010021, Japan
[2] NTT DoCoMo Inc, Yokosuka, Kanagawa 2398536, Japan
[3] Univ Tokyo, Inst Ind Sci, Meguro Ku, Tokyo 1538505, Japan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is constantly been infringed by inadvertent loss of secret keys, and as a solution, Dodis, Katz, Xu, and Yung [11], in Eurocrypt 2002, proposed a new paradigm called key-insulated security which provides tolerance against key exposures. Their scheme introduces a "helper key" which is used to periodically update the decryption key. The most attractive part of this scheme is that even if a decryption key of a time period is exposed, the security of the rest of the periods are unaffected. But how does this helper key managed? Can it be done efficiently? As, to alleviate the damage caused by key exposures, decryption key has to be updated at very short intervals, although frequent updating will, in contrary, increase the risk of helper key exposure. In this paper, we propose parallel key-insulated public key encryption in which two distinct helper keys alternately update a decryption key. The helper key of one system is independent from the other. Not only does it decrease the chance of helper key exposures, it also allows frequent updating of the decryption key, and over all, increases the security of the system.
引用
收藏
页码:105 / 122
页数:18
相关论文
共 50 条
  • [31] Parallel Key-Insulated Signature Scheme without Random Oracles
    Wan, Zhongmei
    Li, Jiguo
    Hong, Xuan
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (03) : 252 - 257
  • [32] Key-insulated aggregate signature
    Huiyan Zhao
    Jia Yu
    Shaoxia Duan
    Xiangguo Cheng
    Rong Hao
    Frontiers of Computer Science, 2014, 8 : 837 - 846
  • [33] Certificateless Key-Insulated Encryption: Cryptographic Primitive for Achieving Key-Escrow Free and Key-Exposure Resilience
    He, Libo
    Yuan, Chen
    Xiong, Hu
    Qin, Zhiguang
    BIG DATA COMPUTING AND COMMUNICATIONS, (BIGCOM 2016), 2016, 9784 : 387 - 395
  • [34] Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
    Liu, Zhen
    Yang, Guomin
    Wong, Duncan S.
    Khoa Nguyen
    Wang, Huaxiong
    2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 215 - 230
  • [35] Identity-based hierarchical strongly key-insulated encryption and its application
    Hanaoka, Y
    Hanaoka, G
    Shikata, J
    Imai, H
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 495 - 514
  • [36] Identity-based parallel key-insulated signature: Framework and construction
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Li, Xiangxue
    JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2008, 40 (01): : 55 - 68
  • [37] An Efficient Key-Insulated Signature Scheme
    Liang, Xiangqian
    Wang, Yandong
    Gao, Dezhi
    Zhang, Yonghua
    ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 29 - +
  • [38] A new key-insulated signature scheme
    González-Deleito, N
    Markowitch, O
    Dall'Olio, E
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 465 - 479
  • [39] Identity-based threshold key-insulated encryption without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Zheng, Dong
    Qiu, Weidong
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 203 - +
  • [40] A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME
    Lin, Han-Yu
    Hsu, Chien-Lung
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (03) : 739 - 756