Parallel Key-Insulated Public Key Encryption
Security is constantly been infringed by inadvertent loss of secret keys, and as a solution, Dodis, Katz, Xu, and Yung , in Eurocrypt 2002, proposed a new paradigm called key-insulated security which provides tolerance against key exposures. Their scheme introduces a “helper key” which is used to periodically update the decryption key. The most attractive part of this scheme is that even if a decryption key of a time period is exposed, the security of the rest of the periods are unaffected. But how does this helper key managed? Can it be done efficiently? As, to alleviate the damage caused by key exposures, decryption key has to be updated at very short intervals, although frequent updating will, in contrary, increase the risk of helper key exposure. In this paper, we propose parallel key-insulated public key encryption in which two distinct helper keys alternately update a decryption key. The helper key of one system is independent from the other. Not only does it decrease the chance of helper key exposures, it also allows frequent updating of the decryption key, and over all, increases the security of the system.
KeywordsRandom Oracle Security Parameter Query Algorithm Cryptographic Hash Function Challenge Ciphertext
- 1.Anderson, R.: Two remarks on public key cryptology. In: Invited Lecture, ACM CCCS 1997, available at http://www.cl.cam.ac.uk/users/rja14/
- 7.Bellare, M., Palacio, A.: Protecting against key exposure: strongly key-insulated encryption with optimal threshold, available at http://eprint.iacr.org/2002/064/
- 8.Bellare, M., Miner, S.K.: A forward-secure digital signature scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 431–448. Springer, Heidelberg (1999)Google Scholar
- 16.Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537–554. Springer, Heidelberg (1999)Google Scholar