(1) Department of Computer Science and Engineering Shanghai Jiao Tong University China; (2) Department of Computer Science Jinan University China; (3) Shanghai Key Laboratory of Scalable Computing and Systems China; (4) State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China; (5) State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China; (6) School of Information Security Engineering Shanghai Jiao Tong University China
It is worthwhile to deal with the key-exposure problem for identity-based signature. Identity-based key-insulated signature can successfully reduce the damage caused by key-exposure, and thus attracts the researchers' great interest. In this paper, we study the problem of how to generically construct identity-based strong key-insulated signature, and proposed a generic construction of identity-based strong key-insulated signature schemes from two-level hierarchical identity-based signature.
English Abstract:
It is worthwhile to deal with the key-exposure problem for identity-based signature. Identity-based key-insulated signature can successfully reduce the damage caused by key-exposure, and thus attracts the researchers' great interest. In this paper, we study the problem of how to generically construct identity-based strong key-insulated signature, and proposed a generic construction of identity-based strong key-insulated signature schemes from two-level hierarchical identity-based signature.
Zhou Dehua,Weng Jian,Chen Kefei,et al. generic construction of identity-based strong key-insulated signature[J]. Journal of Internet Technology,2011-01-01,12(4):629-636.