Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)
Article type: Research Article
Authors: Li, Jiguoa; ** | Huang, Xinyib | Mu, Yib | Susilo, Willyb | Wu, Qianhongc; d
Affiliations: [a] College of Computer and Information Engineering, Hohai University, Nanjing, 210098, P. R. China. E-mail: [email protected] | [b] Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia. E-mails: [email protected], [email protected], [email protected] | [c] School of Computer Science and Technology, Wuhan University, Wuhan, 430072, P. R. China. E-mail: [email protected] | [d] Department of Computer Engineering and Mathematics, University Rovira i Virgili, Tarragona, Catalonia
Correspondence: [**] Corresponding author. Tel.: +86 2583787590; Fax: +86 2583787793; E-mail: [email protected].
Note: [*] This is the extended version of the paper “Certificate-based signature: Security models and efficient construction” appeared in EuroPKI’07. This work is supported by the National Natural Science Foundation of China (No. 60842002, 60673070), the National High-Tech Research and Development Plan of China under Grant (No. 2007AA01Z409), Hohai, Jiangsu and China Planned Projects for Postdoctoral Research Funds.
Abstract: In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certificate-based encryption lies in the following features: (1) providing more efficient public-key infrastructure (PKI) that requires less infrastructure, (2) solving the certificate revocation problem, and (3) eliminating third-party queries in the traditional PKI. Additionally, it also offers the solution to the inherent key escrow problem in the identity-based cryptography. The contributions of this paper are threefold. Firstly, we introduce a new attack called the “Key Replacement Attack” into the certificate-based signature system and refine the security model of certificate-based signature. Secondly, we show that the certificate-based signature scheme presented by Kang, Park and Hahn in CT-RSA 2004 is insecure against key replacement attacks. Thirdly, we present two new certificate-based signature schemes secure against key replacement attacks. Our first scheme is existentially unforgeable against adaptive chosen message attacks under the computational Diffie–Hellman assumption in the random oracle model. Compared with the certificate-based signature scheme in CT-RSA 2004, our first scheme enjoys shorter signature length and less operation cost. Our second scheme is inspired by Waters signature and is the first construction of certificate-based signature secure against key replacement attacks in the standard model.
Keywords: Certificate-based signature, key replacement attack, PKI
DOI: 10.3233/JCS-2009-0366
Journal: Journal of Computer Security, vol. 18, no. 3, pp. 421-449, 2010
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]