In this paper, we present Key-Updating Schemes in identity-based (identifi- cation or signature) systems, and consider the security of the schemes. We propose two kinds of key-updating schemes, i.e., one is sequential type and the other is parallel type, and show that both schemes arc equivalent to each other in a polynomial time sense, i.e., there exists a deterministic polynomial time algorithm that transforms the sequential key-updating scheme to the par- allel one, and vice versa. We also show that even if any polynomially many entities conspire to find a secret-key of any other entities, both key-updating schemes are provably secure against polynomially many times key-updating if decrypting RSA is hard.
CITATION STYLE
Shinozaki, S., Itoh, T., Fujioka, A., & Tsujii, S. (1991). Provably secure key-updating schemes in identity-based systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 473 LNCS, pp. 16–30). Springer Verlag. https://doi.org/10.1007/3-540-46877-3_3
Mendeley helps you to discover research relevant for your work.