Sciweavers

Share
CISC
2006
Springer

Efficient Intrusion-Resilient Signatures Without Random Oracles

11 years 11 months ago
Efficient Intrusion-Resilient Signatures Without Random Oracles
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into distinct periods where private keys are periodically updated while public keys remain fixed. Private keys are stored in both a user and a base; signature operations are performed by the user while the base is involved in periodic updates. Such a system remains secure after arbitrarily many compromises of both modules as long as break-ins are not simultaneous. Besides, when they simultaneously occur within some time period, past periods remain safe. In this work, we propose the first intrusion-resilient signature in the standard model (i.e. without random oracles) which provides both short signatures and at most log-squared private storage in the number of time periods. Keywords. Intrusion-resilience, standard model, signatures, pairings.
Benoît Libert, Jean-Jacques Quisquater, Moti
Added 20 Aug 2010
Updated 20 Aug 2010
Type Conference
Year 2006
Where CISC
Authors Benoît Libert, Jean-Jacques Quisquater, Moti Yung
Comments (0)
books