Skip to main content
Log in

Key-insulated aggregate signature

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the definition and the security model of the key-insulated aggregate signature. We also construct a concrete key-insulated aggregate signature scheme that meets our definition. Our scheme has the properties of efficient verification and short signature length. We prove the security of our scheme in the random oracle model under the computation Diffie-Hellman assumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Boneh D, Gentry C, Lynn B, Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. Lecture Notes in Computer Science, 2003, 2656: 416–432

    Article  MathSciNet  Google Scholar 

  2. Lu S, Ostrovsky R, Sahai A, Shacham H. Sequential aggregate signatures and multisignatures without random oracles. Lecture Notes in Computer Science, 2006, 4004: 456–485

    MathSciNet  Google Scholar 

  3. Bagherzandi A, Jarecki S. Identity-Based aggregate and multisignature schemes based on RSA. Lecture Notes in Computer Science, 2010, 6056: 480–498

    Article  MathSciNet  Google Scholar 

  4. Hohenberger S, Sahai A, Waters B. Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. Lecture Notes in Computer Science, 2013, 8042: 494–512

    Article  Google Scholar 

  5. Kuchta V, Manulis M. Unique aggregate signatures with applications to distributed verifiable random functions. Lecture Notes in Computer Science, 2013, 8257: 251–270

    Article  MathSciNet  Google Scholar 

  6. Xia H, Jia Z, Li X, Ju L, Sha E. Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 2013, 11(7): 2096–2114

    Article  Google Scholar 

  7. Bellare M, Miner S. A forward-secure digital signature scheme. Lecture Notes in Computer Science, 1999, 1666: 431–448

    Article  Google Scholar 

  8. Yu J, Hao R, Kong F, Cheng X, Fan J, Chen Y. Forward-secure identitybased signature: security notions and construction. Information Sciences, 2011, 181(3): 648–660

    Article  MathSciNet  MATH  Google Scholar 

  9. Yu J, Kong F Y, Cheng X G, Hao R, Fan J X. Forward-secure identitybased public-key encryption without random oracles. Fundamenta Informaticae, 2011, 111(2): 241–256

    MathSciNet  MATH  Google Scholar 

  10. Yu J, Kong F Y, Cheng X G, Hao R, Li G W. One forward-secure signature scheme using bilinear maps and its applications. Information Sciences, 2014, 279: 60–76

    Article  Google Scholar 

  11. Li W P, Xu C X, Zhang W Z, Zhu S X, Zhang X J. New forwardsecure signature schemes with untrusted update. Frontiers of Computer Science, 2013, 7(4): 536–543

    Article  MathSciNet  Google Scholar 

  12. Dodis Y, Katz J, Xu S H, Yung M. Key-insulated public-key cryptosystems. Lecture Notes in Computer Science, 2002, 2332: 65–82

    Article  MathSciNet  Google Scholar 

  13. Dodis Y, Luo W L, Xu S H, Yung M. Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. 2012: 57–58

    Google Scholar 

  14. Ge L R, Yu J, Cheng X G, Hao R, Zhao H Y, Li Meng. Strong keyinsulated signature scheme supporting multi-helpers in the standard model. Journal of Computer Research and Development, 2014 51(5): 1081–1088 (in Chinese)

    Google Scholar 

  15. Chen J H, Chen K F, Long Y. Identity-based threshold key-insulated signature. High Technology Letters, 2012, 18(3): 275–280

    Google Scholar 

  16. Itkis G, Reyzin L. Signer-base intrusion-resilient signatures. Lecture Notes in Computer Science, 2002, 2442: 499–514

    Article  MathSciNet  Google Scholar 

  17. Yu J, Kong F Y, Cheng X G, Hao R, Fan J X. Intrusion-resilient identity-based signature: security definition and construction. Journal of Systems and Software, 2012, 85(2): 382–391

    Article  Google Scholar 

  18. Pietro R D, Soriente C, Spognardi A, Tsudik G. Intrusion-resilient integrity in data-centric unattended WSNs. Pervasive and Mobile Computing, 2011, 7(4): 495–508

    Article  Google Scholar 

  19. Ma D. Practical forward secure sequential aggregate signatures. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. 2008, 341–352

    Google Scholar 

  20. Dodis Y, Katz J, Xu S, Yung M. Strong key-insulated signature schemes. Lecture Notes in Computer Science, 2003, 2567: 130–144

    Article  MathSciNet  Google Scholar 

  21. Wan Z M, Lai X J, Weng J, Liu, S L, Long Y, Hong X. Strong keyinsulated signature in the standard model. Journal of Shanghai Jiaotong University, 2010, 15(6): 657–661

    Article  MATH  Google Scholar 

  22. Zhou Y, Cao Z, and Chai Z. Identity based key insulated signaturepp, In: Proceedings of Information Security Practice and Experience Conference. 2006, 226–234

    Chapter  Google Scholar 

  23. Tseng Y M, Wu T Y, Wu J D. An efficient and provably secure ID-based signature scheme with batch verifications. International Journal of Innovative Computing, Information and Control, 2009, 5(11A): 3911–3922

    Google Scholar 

  24. Wu T Y, Tseng Y M and Yu Ch W. ID-based key-insulated signature scheme with batch verifications and its novel application. International Journal of Innovative Computing, Information and Control, 2012, 8(7A): 4797–4810

    Google Scholar 

  25. Lin H Y, Wu T S, Lee M L, Yeh C K. New efficient identity-based key-insulated multisignature scheme. International Journal of Machine Learning and Computing, 2013, 3(1): 117–120

    Article  Google Scholar 

  26. Hanaoka G, Hanaoka Y, Imai H. Parallel key-insulated public key encryption. Lecture Notes in Computer Science, 2006, 3958: 105–122

    Article  MathSciNet  Google Scholar 

  27. Weng J, Chen K F, Li X X, Liu S L, Qiu W D. Parallel key-insulated signature framework and construction. Journal of Shanghai Jiaotong University, 2008, 13(1): 6–11

    Article  Google Scholar 

  28. Shim K A. An ID-based aggregate signature scheme with constant pairing computations. Journal of Systems and Software, 2010, 83(10): 1873–1880

    Article  Google Scholar 

  29. Schroder D. How to aggregate the CL signature scheme. Lecture Notes in Computer Science, 2011, 6879: 298–314

    Article  Google Scholar 

  30. Brogle K, Goldberg S, and Reyzin L. Sequential aggregate signatures with lazy verification from trapdoor permutations. Lecture Notes in Computer Science, 2012, 7658: 644–662

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jia Yu.

Additional information

Huiyan Zhao, born in 1986. Master candidate in Qingdao University. Her research interests include cryptography and information security.

Jia Yu, born in 1976. PhD and professor in Qingdao University. Senior member of China Computer Federation. His main research interests are cryptography and network security.

Shaoxia Duan, born in 1989. Master candidate in Qingdao University. Her research interests include cryptography and information security.

Xiangguo Cheng, born in 1969. PhD and associate professor in Qingdao University, His main research interests are cryptography and network security.

Rong Hao, born in 1976. Master and lecturer in Qingdao University, Her main research interests are cryptography and network security.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, H., Yu, J., Duan, S. et al. Key-insulated aggregate signature. Front. Comput. Sci. 8, 837–846 (2014). https://doi.org/10.1007/s11704-014-3244-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11704-014-3244-1

Keywords

Navigation