ارسل ملاحظاتك

ارسل ملاحظاتك لنا







Identity Based key Insulated Aggregate Signature Scheme

المصدر: مجلة جامعة الملك سعود - علوم الحاسب والمعلومات
الناشر: جامعة الملك سعود
المؤلف الرئيسي: Reddy, P. Vasudeva (Author)
مؤلفين آخرين: Gopal, P. V. S. S. N. (Co-Author)
المجلد/العدد: مج29, ع3
محكمة: نعم
الدولة: السعودية
التاريخ الميلادي: 2017
الصفحات: 303 - 310
DOI: 10.33948/0584-029-003-007
ISSN: 1319-1578
رقم MD: 974195
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: science
مواضيع:
كلمات المؤلف المفتاحية:
ID Based Signature | Key Insulated Mechanism | Aggregate Signature | Bilinear Pairings | CDH Problem | Unforgeability
رابط المحتوى:
صورة الغلاف QR قانون
حفظ في:
LEADER 02137nam a22002417a 4500
001 1716994
024 |3 10.33948/0584-029-003-007 
041 |a eng 
044 |b السعودية 
100 |9 525426  |a Reddy, P. Vasudeva  |e Author 
245 |a Identity Based key Insulated Aggregate Signature Scheme 
260 |b جامعة الملك سعود  |c 2017 
300 |a 303 - 310 
336 |a بحوث ومقالات  |b Article 
520 |b  Private key exposure can be the most devastating attack on cryptographic schemes; as such exposure leads to the breakage of security of the scheme as a whole. In the real world scenario, this problem is perhaps the biggest threat to cryptography. The threat is increasing with users operating on low computational devices (e.g. mobile devices) which hold the corresponding private key for generating signatures. To reduce the damage caused by the key exposure problem in aggregate signatures and preserve the benefits of identity-based (ID-based) cryptography, we hereby propose the first key-insulated aggregate signature scheme in ID-based setting. In this scheme the leakage of temporary private keys will not compromise the security of all the remaining time periods. The security of our scheme is proven secure in the random oracle paradigm with the assumption that the Computational Diffie–Hellman (CDH) problem is intractable. The proposed scheme allows an efficient verification with constant signature size, independent of the number of signers. 
653 |a أمن المعلومات  |a التشفير  |a برامج الحاسوب 
692 |b ID Based Signature  |b Key Insulated Mechanism  |b Aggregate Signature  |b Bilinear Pairings  |b CDH Problem  |b Unforgeability 
700 |9 525428  |a Gopal, P. V. S. S. N.  |e Co-Author 
773 |c 007  |e Journal of King Saud University (Computer and Information Sciences)  |f Maǧalaẗ ǧamʼaẗ al-malīk Saud : ùlm al-ḥasib wa al-maʼlumat  |l 003  |m مج29, ع3  |o 0584  |s مجلة جامعة الملك سعود - علوم الحاسب والمعلومات  |v 029  |x 1319-1578 
856 |u 0584-029-003-007.pdf 
930 |d y  |p y 
995 |a science 
999 |c 974195  |d 974195 

عناصر مشابهة