4.6 Article

Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography

Journal

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Volume 17, Issue 5, Pages 1124-1132

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2018.2857775

Keywords

Protocols; Cryptography; Mobile handsets; Internet of Things; Standards; Two-party signature; mobile device; secure and efficient

Funding

  1. National Key Research and Development Program of China [2017YFB0802500]
  2. National Natural Science Foundation of China [61572379, 61501333, U1536204]
  3. National High-Tech Research and Development Program of China (863 Program) [2015AA016004]
  4. State Key Laboratory of Cryptology
  5. Natural Science Foundation of Hubei Province of China [2015CFB257]
  6. Cloud Technology Endowed Professorship

Ask authors/readers for more resources

Mobile device and application (app) security are increasingly important, partly due to the constant and fast-paced cyberthreat evolution. To ensure the security of communication (e.g., data-in-transit), a number of identity-based signature schemes have been designed to facilitate authorization identification and validation of messages. However, in many of these schemes, a user's private key may leak when a new signature is generated since the private keys are stored on the device. Seeking to improve the security of the private key, we propose the first two-party distributed signing protocol for the identity-based signature scheme in the IEEE P1363 standard. This protocol requires that two devices separately store one part of the user's private key, and allows these two devices to generate a valid signature without revealing the entire private key of the user. We formally prove that the security of the protocol in the random oracle model. Then, we implement the protocol using the MIRACL library and evaluate the protocol on two mobile devices. Compared with the protocol of Lindell (CRYPTO'17) that uses the zero-knowledge proof for its security, our protocol is more suitable for deployment in the mobile environment.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available