Font Size: a A A

Study On Key Insulated Cryptosystem With Provable Security

Posted on:2015-05-14Degree:DoctorType:Dissertation
Country:ChinaCandidate:G B ZhuFull Text:PDF
GTID:1108330473952453Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the rapid advancement of information technology(IT), the information security becomes one of the main obstacles that impedes IT from wide adoption in different areas. As one important component of information security, public key cryptography attracts unprecedented attention recently. The key leakage seems to be inevitable thanks to the Trojan horse, virus and vulnerability of operation system in case the public key cryptosystem has been deployed in the hostile environment. The security of the public key cryptosystem will be entirely broken if the private key is leaked due to the fact that the security of the system depends on the private key. The key insulated crptography has been initially introduced to reduce the damage caused by the key leakage based on the idea of key evolving. In particular, the lifetime of the private key has been divided into N independent timeslice and the private key will evolve according to different time periods. In case the private key in some time periods has been corrupted, the security of the private key in the other time periods will be guaranteed. Therefore, the key insulated cryptography has received a lot of attention since its introduction. Followed the research line of the provable security, the construction of the key insulated mechanisms and its security analysis has been investigated in this dissertation. The main contribution of this dissertation consists of the following three parts.1) A provably-secure identity-based key insulated signcryption scheme has been proposed in the standard model. Based on the analysis of Chen et al.’s ID-based key insulated signcryption scheme, an improved signcryption scheme has been suggested, which can achieve in-distinguishability against adaptive chosen ciphertext attacks(IND-CCA2)and existential unforgeability against adaptive chose message attacks(EUF-CMA). Furthermore, The security of this scheme has been proved without random oracle model.Comparing with the competitive schemes,performance evaluation shows that our protocol is practical in terms of computational efficiency and cipher text length, etc.2) A pairing-free ID-based key-insulated signature scheme has been proposed based on elliptic curve cryptosystem.In view of the expensive bilinear pairing operation, an ID-based key-insulated signature scheme has been proposed based on elliptical curve cryptosystem,in order to reduce the computational overhead. After giving the formal definition and security model of ID-based key-insulated signature scheme, the concrete construction has been given under the Discrete Logarithm(DL) assumption. The security proof of the proposed scheme has been present in the random oracle model. Compared with previous work, the proposed scheme minimizes the computation cost without extra cost.3) An ID-based key agreement protocol is proposed by incorporating the idea of key evolution and elliptic curve cryptography. Since all of existing ID-based authenticated key agreement protocols can not provide backward security, a new ID-based keyinsulated key agreement protocol is put forward to enhance the security based on elliptic curve cryptosystem. The analysis results show that the proposed protocol can not only meet all security riquirements, but also it provides forward security. In addition, a noninteractive hierarchical identity based authenticated key agreement protocol is analyzed in the paper, which is present by Guo et al. The result indicates that Guo et al.’s protocol is not secure even against the corruption of any leaf or intermediate nodes in the hierarchy. Concretely, the session key of one node will be compromised provided that one of its child nodes has been corrupted.
Keywords/Search Tags:identity-based, key insulated, signature, signcryption, authenticated key agreement
PDF Full Text Request
Related items